Sciweavers

589 search results - page 31 / 118
» Generalized Dominators and Post-Dominators
Sort
View
ICPR
2000
IEEE
16 years 1 months ago
Statistical Motion-Based Object Indexing Using Optic Flow Field
In this paper, we propose an original approach for content-based video indexing and retrieval. It relies on the tracking of entities of interest and the analysis of their apparent...
Ronan Fablet, Patrick Bouthemy
104
Voted
DAC
2004
ACM
16 years 1 months ago
Synthesizing interconnect-efficient low density parity check codes
Error correcting codes are widely used in communication and storage applications. Codec complexity has usually been measured with a software implementation in mind. A recent hardw...
Marghoob Mohiyuddin, Amit Prakash, Adnan Aziz, Way...
93
Voted
WWW
2006
ACM
16 years 1 months ago
Why is connectivity in developing regions expensive: policy challenges more than technical limitations?
I present analysis examining some of the causes of poor connectivity in developing countries. Based on a technoeconomic analysis and design, I show that technical limitations per ...
Rahul Tongia
WWW
2004
ACM
16 years 1 months ago
Browser-based applications: positive transference or interference?
Applications that run on top of web browsers dominate the Internet today. Given the many similarities among these applications' features, positive transference from one to an...
Mark S. Silver, Sidne G. Ward
120
Voted
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
15 years 7 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry