Sciweavers

8699 search results - page 1595 / 1740
» Elements of the Theory of Computation
Sort
View
CCS
2006
ACM
15 years 3 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
GROUP
2009
ACM
15 years 2 months ago
GroupMind: supporting idea generation through a collaborative mind-mapping tool
Collaborative brainstorming can be a challenging but important part of creative group problem solving. Mind-mapping has the potential to enhance the brainstorming process but has ...
Patrick C. Shih, David H. Nguyen, Sen H. Hirano, D...
SIGGRAPH
2010
ACM
15 years 2 months ago
Camouflage images
Camouflage images contain one or more hidden figures that remain imperceptible or unnoticed for a while. In one possible explanation, the ability to delay the perception of the hi...
Hung-Kuo Chu, Wei-Hsin Hsu, Niloy J. Mitra, Daniel...
CVPR
2010
IEEE
15 years 1 months ago
A Study on Continuous Max-Flow and Min-Cut Approaches
Abstract. This work addresses a class of total-variation based multilabeling problems over a spatially continuous image domain, where the data fidelity term can be any bounded fun...
Jing Yuan, Egil Bae, Xuecheng Tai
SPIEVIP
2010
15 years 1 months ago
Automatic scene activity modeling for improving object classification
In video surveillance, automatic methods for scene understanding and activity modeling can exploit the high redundancy of object trajectories observed over a long period of time. ...
Samuel Foucher, Marc Lalonde, Langis Gagnon
« Prev « First page 1595 / 1740 Last » Next »