Sciweavers

2652 search results - page 498 / 531
» Positioning using local maps
Sort
View
IACR
2011
125views more  IACR 2011»
14 years 4 days ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
140
Voted
ICC
2011
IEEE
237views Communications» more  ICC 2011»
14 years 4 days ago
Reorganized and Compact DFA for Efficient Regular Expression Matching
—Regular expression matching has become a critical yet challenging technique in content-aware network processing, such as application identification and deep inspection. To meet ...
Kai Wang, Yaxuan Qi, Yibo Xue, Jun Li
115
Voted
TCSV
2008
277views more  TCSV 2008»
15 years 12 days ago
Automatic Single View-Based 3-D Face Synthesis for Unsupervised Multimedia Applications
Abstract--Various 3-D face synthesis techniques have been proposed and extensively used in many applications. Compared with others, single view-based face synthesis technology allo...
Yun Sheng, Abdul H. Sadka, Ahmet M. Kondoz
COMPUTING
2004
204views more  COMPUTING 2004»
15 years 11 days ago
Image Registration by a Regularized Gradient Flow. A Streaming Implementation in DX9 Graphics Hardware
The presented image registration method uses a regularized gradient flow to correlate the intensities in two images. Thereby, an energy functional is successively minimized by des...
Robert Strzodka, Marc Droske, Martin Rumpf
115
Voted
STOC
2003
ACM
124views Algorithms» more  STOC 2003»
16 years 24 days ago
Extractors: optimal up to constant factors
This paper provides the first explicit construction of extractors which are simultaneously optimal up to constant factors in both seed length and output length. More precisely, fo...
Chi-Jen Lu, Omer Reingold, Salil P. Vadhan, Avi Wi...