Sciweavers

1066 search results - page 93 / 214
» Computing Private Set Operations with Linear Complexities
Sort
View
IJNSEC
2007
128views more  IJNSEC 2007»
14 years 9 months ago
LFSR-based Signatures with Message Recovery
In order to reduce key sizes and bandwidth, several LFSRbased (linear feedback shift register) public key cryptosystems and signature schemes have been proposed. Digital signature...
Xiangxue Li, Dong Zheng, Kefei Chen
ECCV
2002
Springer
15 years 11 months ago
Learning Shape from Defocus
We present a novel method for inferring three-dimensional shape from a collection of defocused images. It is based on the observation that defocused images are the null-space of ce...
Paolo Favaro, Stefano Soatto
ACIVS
2005
Springer
15 years 3 months ago
Image De-Quantizing via Enforcing Sparseness in Overcomplete Representations
We describe a method for removing quantization artifacts (de-quantizing) in the image domain, by enforcing a high degree of sparseness in its representation with an overcomplete or...
Luis Mancera, Javier Portilla
JCPHY
2011
87views more  JCPHY 2011»
14 years 23 days ago
A fast directional algorithm for high-frequency electromagnetic scattering
This paper is concerned with the fast solution of high frequency electromagnetic scattering problems using the boundary integral formulation. We extend the O(N log N) directional ...
Paul Tsuji, Lexing Ying
CPAIOR
2009
Springer
15 years 4 months ago
Optimal Interdiction of Unreactive Markovian Evaders
The interdiction problem arises in a variety of areas including military logistics, infectious disease control, and counter-terrorism. In the typical formulation of network interdi...
Alexander Gutfraind, Aric A. Hagberg, Feng Pan