At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
In state-of-the-art image retrieval systems, an image is
represented by a bag of visual words obtained by quantizing
high-dimensional local image descriptors, and scalable
schem...
Zhong Wu (Tsinghua University), Qifa Ke (Microsoft...
All surfaces can be classified by the conformal equivalence
relation. Conformal invariants, which are shape indices
that can be defined intrinsically on a surface, may
be used t...
Paul M. Thompson, Tony F. Chan, Xianfeng Gu, Yalin...
We describe a method for producing a smooth, stabilized
video from the shaky input of a hand-held light field video camera—
specifically, a small camera array. Traditional stab...
Brandon M. Smith, Li Zhang, Hailin Jin, Aseem Agar...
The Internet contains billions of images, freely available online. Methods for efficiently searching this incredibly rich resource are vital for a large number of applications. Th...