Sciweavers

5153 search results - page 931 / 1031
» Introduction to Randomized Algorithms
Sort
View
115
Voted
IACR
2011
94views more  IACR 2011»
14 years 2 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
148
Voted
STOC
2010
ACM
200views Algorithms» more  STOC 2010»
15 years 12 months ago
Hardness Amplification in Proof Complexity
We present a generic method for converting any family of unsatisfiable CNF formulas that require large resolution rank into CNF formulas whose refutation requires large rank for p...
Paul Beame, Trinh Huynh and Toniann Pitassi
ISCA
2005
IEEE
101views Hardware» more  ISCA 2005»
15 years 8 months ago
Near-Optimal Worst-Case Throughput Routing for Two-Dimensional Mesh Networks
Minimizing latency and maximizing throughput are important goals in the design of routing algorithms for interconnection networks. Ideally, we would like a routing algorithm to (a...
Daeho Seo, Akif Ali, Won-Taek Lim, Nauman Rafique,...
CVPR
2004
IEEE
16 years 4 months ago
Model-Based Motion Clustering Using Boosted Mixture Modeling
Model-based clustering of motion trajectories can be posed as the problem of learning an underlying mixture density function whose components correspond to motion classes with dif...
Vladimir Pavlovic
123
Voted
CVPR
2008
IEEE
16 years 4 months ago
Principled fusion of high-level model and low-level cues for motion segmentation
High-level generative models provide elegant descriptions of videos and are commonly used as the inference framework in many unsupervised motion segmentation schemes. However, app...
Arasanathan Thayananthan, Masahiro Iwasaki, Robert...