Sciweavers

2778 search results - page 23 / 556
» Limit complexities revisited
Sort
View
ESAS
2004
Springer
15 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ICCV
2007
IEEE
15 years 11 months ago
Normalized Cuts Revisited: A Reformulation for Segmentation with Linear Grouping Constraints
Indisputably Normalized Cuts is one of the most popular segmentation algorithms in computer vision. It has been applied to a wide range of segmentation tasks with great success. A...
Anders P. Eriksson, Carl Olsson, Fredrik Kahl
RECOMB
2005
Springer
15 years 10 months ago
Consensus Folding of Unaligned RNA Sequences Revisited
As one of the earliest problems in computational biology, RNA secondary structure prediction (sometimes referred to as "RNA folding") problem has attracted attention agai...
Vineet Bafna, Haixu Tang, Shaojie Zhang
ASIACRYPT
2009
Springer
15 years 4 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
HRI
2006
ACM
15 years 3 months ago
Working with robots and objects: revisiting deictic reference for achieving spatial common ground
Robust joint visual attention is necessary for achieving a common frame of reference between humans and robots interacting multimodally in order to work together on realworld spat...
Andrew G. Brooks, Cynthia Breazeal