Sciweavers

1628 search results - page 225 / 326
» Compiler Construction Using Scheme
Sort
View
111
Voted
ICIP
1999
IEEE
15 years 6 months ago
Local Wavelets Decomposition for 3-D Surfaces
We propose a wavelet based local subdivision of 3-D surfaces, which can be effectively applied to a mesh with complex and high curvature faces. The proposed approach is an extensi...
Yun-Sang Kim, Sébastien Valette, Ho-Youl Ju...
102
Voted
FC
2010
Springer
230views Cryptology» more  FC 2010»
15 years 6 months ago
Multiple Denominations in E-cash with Compact Transaction Data
We present a new construction of divisible e-cash that makes use of 1) a new generation method of the binary tree of keys; 2) a new way of using bounded accumulators. The transacti...
Sébastien Canard, Aline Gouget
ACISP
2008
Springer
15 years 4 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
LREC
2008
141views Education» more  LREC 2008»
15 years 3 months ago
Building a Corpus of Temporal-Causal Structure
While recent corpus annotation efforts cover a wide variety of semantic structures, work on temporal and causal relations is still in its early stages. Annotation efforts have typ...
Steven Bethard, William Corvey, Sara Klingenstein,...
NIPS
2008
15 years 3 months ago
The Infinite Factorial Hidden Markov Model
We introduce a new probability distribution over a potentially infinite number of binary Markov chains which we call the Markov Indian buffet process. This process extends the IBP...
Jurgen Van Gael, Yee Whye Teh, Zoubin Ghahramani