Sciweavers

3143 search results - page 514 / 629
» Minimization of entropy functionals
Sort
View
110
Voted
HT
1991
ACM
15 years 7 months ago
Implementing Hypertext Database Relationships through Aggregations and Exceptions
In order to combine hypertext with database facilities, we show how to extract an effective storage structure from given instance relationships. The schema of the structure recogn...
Yoshinori Hara, Arthur M. Keller, Gio Wiederhold
118
Voted
SIGGRAPH
1991
ACM
15 years 7 months ago
Deformable curve and surface finite-elements for free-form shape design
The finite element method is applied to generate primitives that build continuous deformable shapes designed to support a new free-form modeling paradigm. The primitives autonomou...
George Celniker, Dave Gossard
115
Voted
AINA
2010
IEEE
15 years 7 months ago
PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network
Abstract—We propose PRoPHET+, a routing scheme for opportunistic networks designed to maximize successful data delivery rate and minimize transmission delay. PRoPHET+ computes a ...
Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen
140
Voted
ASIACRYPT
2009
Springer
15 years 7 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
133
Voted
ICPR
2010
IEEE
15 years 7 months ago
Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy
Abstract--This paper proposes a method for estimating extrinsic camera parameters using video images and position data acquired by GPS. In conventional methods, the accuracy of the...
Hideyuki Kume, Takafumi Taketomi, Tomokazu Sato, N...