Sciweavers

2194 search results - page 168 / 439
» Improving HLRTA*( k )
Sort
View
CCS
2004
ACM
15 years 7 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
AVBPA
2003
Springer
171views Biometrics» more  AVBPA 2003»
15 years 6 months ago
Illumination Normalization Using Logarithm Transforms for Face Authentication
Abstract. In this paper we propose an algorithm that can easily be implemented on small form factor devices to perform illumination normalization in face images captured under vari...
Marios Savvides, B. V. K. Vijaya Kumar
136
Voted
ICCAD
1997
IEEE
108views Hardware» more  ICCAD 1997»
15 years 5 months ago
Negative thinking by incremental problem solving: application to unate covering
We introduce a new technique to solve exactly a discrete optimization problem, based on the paradigm of “negative” thinking. The motivation is that when searching the space of...
Evguenii I. Goldberg, Luca P. Carloni, Tiziano Vil...
VLDB
1997
ACM
97views Database» more  VLDB 1997»
15 years 5 months ago
The Complexity of Transformation-Based Join Enumeration
Query optimizers that explore a search space exhaustively using transformation rules usually apply all possible rules on each alternative, and stop when no new information is prod...
Arjan Pellenkoft, César A. Galindo-Legaria,...
COMPGEOM
1994
ACM
15 years 5 months ago
Computing Envelopes in Four Dimensions with Applications
Let F be a collection of n d-variate, possibly partially defined, functions, all algebraic of some constant maximum degree. We present a randomized algorithm that computes the vert...
Pankaj K. Agarwal, Boris Aronov, Micha Sharir