Sciweavers

6274 search results - page 1074 / 1255
» From query complexity to computational complexity
Sort
View
PAMI
2011
14 years 12 months ago
Decoupled Active Contour (DAC) for Boundary Detection
— The accurate detection of object boundaries via active contours is an ongoing research topic in computer vision. Most active contours converge towards some desired contour by m...
Akshaya Kumar Mishra, Paul W. Fieguth, David A. Cl...
TIT
2011
125views more  TIT 2011»
14 years 12 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 11 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
JDCTA
2010
150views more  JDCTA 2010»
14 years 11 months ago
Ignition Coil Insulation Fault Detection Algorithm
Pulse singularities with variable amplitudes appear in the corresponding positions of ignition coil primary current waveform when insulation fault occurs during the ignition proce...
Mutian Li, Yongping Zhao, Qisong Wang
JOC
2010
96views more  JOC 2010»
14 years 11 months ago
On the Efficient Generation of Prime-Order Elliptic Curves
We consider the generation of prime-order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the ...
Elisavet Konstantinou, Aristides Kontogeorgis, Yan...
« Prev « First page 1074 / 1255 Last » Next »