Sciweavers

411 search results - page 53 / 83
» Extracting Temporal Information from Short Messages
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
15 years 10 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
IJIT
2004
14 years 11 months ago
Computing Entropy for Ortholog Detection
Abstract-- Biological sequences from different species are called orthologs if they evolved from a sequence of a common ancestor species and they have the same biological function....
Hsing-Kuo Pao, John Case
VMV
2004
167views Visualization» more  VMV 2004»
14 years 11 months ago
GPU-PIV
Digital Particle Image Velocimetry (PIV) is an optical technique used to measure the velocity of seeded particles in real flow. A CCD camera captures the flow field twice under ex...
Thomas Schiwietz, Rüdiger Westermann
ICIP
2004
IEEE
15 years 11 months ago
Water video analysis
Many image processing and computer vision applications have difficulty dealing with a nonstatic background such as water waves, but this particular dynamic scene actually contains...
Lisa Spencer, Mubarak Shah
81
Voted
ICPR
2002
IEEE
15 years 10 months ago
A Bayesian Approach to Video Object Segmentation via Merging 3D Watershed Volumes
In this paper, we propose a Bayesian approach to video object segmentation. Our method consists of two stages. In the first stage, we partition the video data into a set of 3D wate...
Yi-Ping Hung, Yu-Pao Tsai, Chih-Chuan Lai