Sciweavers

4335 search results - page 243 / 867
» Privatizing Constraint Optimization
Sort
View
CVPR
2008
IEEE
16 years 6 months ago
Global pose estimation using non-tree models
We propose a novel global pose estimation method to detect body parts of articulated objects in images based on non-tree graph models. There are two kinds of edges defined in the ...
Hao Jiang, David R. Martin
ICASSP
2009
IEEE
15 years 11 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
IROS
2006
IEEE
157views Robotics» more  IROS 2006»
15 years 10 months ago
Trajectory and Spline Generation for All-Wheel Steering Mobile Robots
We present a method for trajectory generation for all-wheel steering mobile robots which can account for rough terrain and predictable vehicle dynamics and apply it to the problem...
Thomas M. Howard, Alonzo Kelly
CDC
2010
IEEE
151views Control Systems» more  CDC 2010»
14 years 11 months ago
Dynamic power allocation in server farms: A Real Time Optimization approach
Abstract-- This paper concerns the power minimization problem in server farms. The power minimization problem over dynamic power allocation schemes is formally defined and formulat...
Mohammadreza Aghajani, Luca Parolini, Bruno Sinopo...
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
15 years 8 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier