Sciweavers

1773 search results - page 233 / 355
» Depth from Diffusion
Sort
View
TCC
2009
Springer
123views Cryptology» more  TCC 2009»
16 years 3 months ago
Hierarchical Identity Based Encryption with Polynomially Many Levels
We present the first hierarchical identity based encryption (HIBE) system that has full security for more than a constant number of levels. In all prior HIBE systems in the literat...
Craig Gentry, Shai Halevi
ICCAD
2006
IEEE
190views Hardware» more  ICCAD 2006»
16 years 2 days ago
Factor cuts
Enumeration of bounded size cuts is an important step in several logic synthesis algorithms such as technology mapping and re-writing. The standard algorithm does not scale beyond...
Satrajit Chatterjee, Alan Mishchenko, Robert K. Br...
ACIVS
2008
Springer
15 years 9 months ago
Scene Reconstruction Using MRF Optimization with Image Content Adaptive Energy Functions
Multi-view scene reconstruction from multiple uncalibrated images can be solved by two stages of processing: first, a sparse reconstruction using Structure From Motion (SFM), and ...
Ping Li, Rene Klein Gunnewiek, Peter H. N. de With
ACCV
2006
Springer
15 years 9 months ago
Dense Motion and Disparity Estimation Via Loopy Belief Propagation
We describe a method for computing a dense estimate of motion and disparity, given a stereo video sequence containing moving non-rigid objects. In contrast to previous approaches, ...
Michael Isard, John MacCormick
DSN
2006
IEEE
15 years 9 months ago
Improving the Fault Resilience of Overlay Multicast for Media Streaming
This paper addresses the problem of fault resilience of overlay-based live media streaming from two aspects: (1) how to construct a stable multicast tree that minimizes the negati...
Guang Tan, Stephen A. Jarvis, Daniel P. Spooner