Sciweavers

6102 search results - page 450 / 1221
» Generating Optimizing Specializers
Sort
View
GLVLSI
2007
IEEE
139views VLSI» more  GLVLSI 2007»
15 years 10 months ago
Synthesis of irregular combinational functions with large don't care sets
A special logic synthesis problem is considered for Boolean functions which have large don’t care sets and are irregular. Here, a function is considered as irregular if the inpu...
Valentin Gherman, Hans-Joachim Wunderlich, R. D. M...
ICCV
2007
IEEE
15 years 10 months ago
Latent Model Clustering and Applications to Visual Recognition
We consider clustering situations in which the pairwise affinity between data points depends on a latent ”context” variable. For example, when clustering features arising fro...
Simon Polak, Amnon Shashua
ICRA
2007
IEEE
104views Robotics» more  ICRA 2007»
15 years 10 months ago
Frame-Frame Matching for Realtime Consistent Visual Mapping
Many successful indoor mapping techniques employ frame-to-frame matching of laser scans to produce detailed local maps, as well as closing large loops. In this paper, we propose a ...
Kurt Konolige, Motilal Agrawal
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
15 years 10 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
15 years 10 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger