Sciweavers

4303 search results - page 54 / 861
» Are We There Yet
Sort
View
96
Voted
AFRICACRYPT
2008
Springer
15 years 7 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
DAC
2006
ACM
15 years 6 months ago
Electronics beyond nano-scale CMOS
This paper presents nano-scale CMOS outlook, discusses the three tenets that have made electronics successful in the past, and using these tenets conclude that there is nothing on...
Shekhar Borkar
115
Voted
ICPR
2008
IEEE
15 years 7 months ago
A new hierarchical approach in robust real-time image feature detection and matching
Object recognition forms a ubiquitous problem in digital image processing. The detection of robust image features of high distinctiveness is one important key in this regard. We p...
Matthias Langer, Klaus-Dieter Kuhnert
SSDBM
1992
IEEE
125views Database» more  SSDBM 1992»
15 years 4 months ago
Modelling Ecological Data
Ecological surveys generate large quantities of data database technology has not yet reached its full potential in this area. Here we investigate approaches to modelling ecologica...
Peter J. Barclay, Jessie B. Kennedy
77
Voted
PRL
2002
89views more  PRL 2002»
15 years 13 days ago
Rejection based classifier for face detection
Pattern detection problems require a separation between two classes, Target and Clutter, where the probability of the former is substantially smaller compared to that of the latte...
Michael Elad, Yacov Hel-Or, Renato Keshet