Sciweavers

1640 search results - page 95 / 328
» Deriving Private Information from Randomized Data
Sort
View
ICDAR
2005
IEEE
15 years 3 months ago
Text Locating Competition Results
This paper describes the results of the ICDAR 2005 competition for locating text in camera captured scenes. For this we used the same data as the ICDAR 2003 competition, which has...
Simon M. Lucas
AMC
2005
218views more  AMC 2005»
14 years 9 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
KDD
2006
ACM
164views Data Mining» more  KDD 2006»
15 years 10 months ago
Sampling from large graphs
Given a huge real graph, how can we derive a representative sample? There are many known algorithms to compute interesting measures (shortest paths, centrality, betweenness, etc.)...
Jure Leskovec, Christos Faloutsos
JPDC
2006
187views more  JPDC 2006»
14 years 10 months ago
Maximum lifetime data sensing and extraction in energy constrained networked sensor systems
We focus on data gathering problems in energy constrained networked sensor systems. The system operates in rounds where a subset of the sensors generate a certain number of data p...
Bo Hong, Viktor K. Prasanna
IJCV
2010
169views more  IJCV 2010»
14 years 8 months ago
Rigid Structure from Motion from a Blind Source Separation Perspective
We present an information theoretic approach to define the problem of structure from motion (SfM) as a blind source separation one. Given that for almost all practical joint densi...
Jeff Fortuna, Aleix M. Martínez