Sciweavers

5580 search results - page 797 / 1116
» Randomized priority algorithms
Sort
View
134
Voted
CVPR
2012
IEEE
13 years 5 months ago
Learning features on robotic surgical tools
Computer-aided surgical interventions in both manual and robotic procedures have been shown to improve patient outcomes and enhance the skills of the human physician. Tool trackin...
Austin Reiter, Peter K. Allen, Tao Zhao
ICIP
2004
IEEE
16 years 5 months ago
Robust perceptual image hashing via matrix invariants
In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
EUROCRYPT
2009
Springer
16 years 4 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay
RECOMB
2005
Springer
16 years 3 months ago
Towards an Integrated Protein-Protein Interaction Network
Abstract. Protein-protein interactions play a major role in most cellular processes. Thus, the challenge of identifying the full repertoire of interacting proteins in the cell is o...
Ariel Jaimovich, Gal Elidan, Hanah Margalit, Nir F...
STOC
2001
ACM
104views Algorithms» more  STOC 2001»
16 years 3 months ago
Spatial gossip and resource location protocols
The dynamic behavior of a network in which information is changing continuously over time requires robust and efficient mechanisms for keeping nodes updated about new information. ...
David Kempe, Jon M. Kleinberg, Alan J. Demers