Sciweavers

24529 search results - page 430 / 4906
» Computing on Authenticated Data
Sort
View
150
Voted
TMM
2002
130views more  TMM 2002»
15 years 4 months ago
Computable scenes and structures in films
In this paper, we present a computational scene model and also derive novel algorithms for computing audio and visual scenes and within-scene structures in films. We use constraint...
Hari Sundaram, Shih-Fu Chang
ASIACRYPT
2009
Springer
15 years 11 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...
BMCBI
2010
185views more  BMCBI 2010»
15 years 4 months ago
ABCtoolbox: a versatile toolkit for approximate Bayesian computations
Background: The estimation of demographic parameters from genetic data often requires the computation of likelihoods. However, the likelihood function is computationally intractab...
Daniel Wegmann, Christoph Leuenberger, Samuel Neue...

Lecture Notes
700views
17 years 2 months ago
Foundations of Computer Science
"This course has two objectives. First (and obvious) is to teach programming. Second is to present some fundamental principles of computer science, especially algorithm desi...
Lawrence C Paulson
OTM
2005
Springer
15 years 10 months ago
Context Knowledge Discovery in Ubiquitous Computing
This article introduces the concept of context knowledge discovery process, and presents a middleware architecture which eases the task of ubiquitous computing developers, while su...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee