The book covers the fundamental computer vision techniques such as template matching histogram transformations, background subtraction, filtering and reflectance models, edge detec...
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Abstract. In self-adjusting computation, programs respond automatically and efficiently to modifications to their data by tracking the dynamic data dependences of the computation ...
: Many geometric problems like generalized Voronoi diagrams, medial axis computations and boundary evaluation involve computation and manipulation of non-linear algebraic primitive...
Shankar Krishnan, Mark Foskey, Tim Culver, John Ke...
Fixpoint Computations with Numerical Acceleration Methods Olivier Bouissou1 , Yassamine Seladji1 CEA, LIST, Laboratory for the Modeling and Analysis of Interacting Systems 91191 Gi...