Sciweavers

12193 search results - page 91 / 2439
» It's not all about
Sort
View
ASIACRYPT
2005
Springer
15 years 5 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
IPPS
2010
IEEE
14 years 9 months ago
A simple thermal model for multi-core processors and its application to slack allocation
Abstract--Power density and heat density of multicore processor system are increasing exponentially with Moore's Law. High temperature on chip greatly affects its reliability,...
Zhe Wang, Sanjay Ranka
CVPR
2005
IEEE
16 years 1 months ago
On the Absolute Quadratic Complex and Its Application to Autocalibration
This article introduces the absolute quadratic complex formed by all lines that intersect the absolute conic. If denotes the 3 ? 3 symmetric matrix representing the image of that ...
Jean Ponce, Kenton McHenry, Théodore Papado...
APLAS
2009
ACM
15 years 6 months ago
Large Spurious Cycle in Global Static Analyses and Its Algorithmic Mitigation
We present a simple algorithmic extension of the classical call-strings approach to mitigate substantial performance degradation caused by spurious interprocedural cycles. Spuriou...
Hakjoo Oh
IIHMSP
2006
IEEE
136views Multimedia» more  IIHMSP 2006»
15 years 6 months ago
Boosted String Representation and Its Application to Video Surveillance
This paper presents a new behavior classification system for analyzing human movements directly from video sequences. First of all, we propose a triangulation-based method to tran...
Yung-Tai Hsu, Jun-Wei Hsieh