Sciweavers

1046 search results - page 144 / 210
» Approximation Algorithms for Domination Search
Sort
View
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
15 years 3 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson
131
Voted
CORR
2010
Springer
190views Education» more  CORR 2010»
15 years 3 months ago
Bidimensionality and EPTAS
Bidimensionality theory appears to be a powerful framework for the development of metaalgorithmic techniques. It was introduced by Demaine et al. [J. ACM 2005 ] as a tool to obtai...
Fedor V. Fomin, Daniel Lokshtanov, Venkatesh Raman...
ICIP
2003
IEEE
16 years 4 months ago
Graph-based object tracking
This paper proposes a model-based methodology for recognizing and tracking objects in digital image sequences. Objects are represented by attributed relational graphs (or ARGs), w...
Cristina Gomila, Fernand Meyer
IUI
2003
ACM
15 years 8 months ago
Summarizing archived discussions: a beginning
This paper describes an approach to digesting threads of archived discussion lists by clustering messages into approximate topical groups, and then extracting shorter overviews, a...
Paula S. Newman, John C. Blitzer
ICASSP
2011
IEEE
14 years 7 months ago
Target localization with NLOS circularly reflected AOAS
Bearings-only localization with light-of-sight (LOS) propagation is well understood. This paper concentrates on bearing-only localization with non-line-of-sight (NLOS) measurement...
Xiufeng Song, Peter Willett, Shengli Zhou