Sciweavers

650 search results - page 100 / 130
» Generalized Self-Approaching Curves
Sort
View
DCC
2001
IEEE
16 years 8 days ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
95
Voted
CVPR
2010
IEEE
15 years 8 months ago
On Growth and Formlets: Sparse Multi-Scale Coding of Planar Shape
This paper presents a sparse representation of 2D planar shape through the composition of warping functions, termed formlets, localized in scale and space. Each formlet subjects t...
Timothy Oleskiw, James Elder, Gabriel Peyr
SIGSOFT
2009
ACM
15 years 7 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
101
Voted
COCO
2009
Springer
98views Algorithms» more  COCO 2009»
15 years 7 months ago
Extractors for Varieties
We study the task of randomness extraction from sources which are distributed uniformly on an unknown algebraic variety. In other words, we are interested in constructing a functi...
Zeev Dvir
83
Voted
MOBICOM
2009
ACM
15 years 7 months ago
Optimal beam scheduling for multicasting in wireless networks
We consider the problem of efficient link-layer multicasting in wireless networks with switched beamforming antennas. The inherent tradeoff between multicasting and beamforming ...
Karthikeyan Sundaresan, Kishore Ramachandran, Samp...