Sciweavers

17920 search results - page 3370 / 3584
» Recentering computer science
Sort
View
AUSAI
2005
Springer
15 years 10 months ago
New Feature Extraction Approaches for Face Recognition
All the traditional PCA-based and LDA-based methods are based on the analysis of vectors. So, it is difficult to evaluate the covariance matrices in such a high-dimensional vector ...
Vo Dinh Minh Nhat, Sungyoung Lee
CAEPIA
2005
Springer
15 years 10 months ago
Mapping Conformant Planning into SAT Through Compilation and Projection
Conformant planning is a variation of classical AI planning where the initial state is partially known and actions can have nondeterministic effects. While a classical plan must a...
Héctor Palacios, Hector Geffner
COCO
2005
Springer
110views Algorithms» more  COCO 2005»
15 years 10 months ago
Prior Entanglement, Message Compression and Privacy in Quantum Communication
Consider a two-party quantum communication protocol for computing some function f : {0, 1}n × {0, 1}n → Z. We show that the first message of P can be compressed to O(k) classi...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
159
Voted
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
15 years 10 months ago
New Minimal Weight Representations for Left-to-Right Window Methods
For an integer w ≥ 2, a radix 2 representation is called a width-w nonadjacent form (w-NAF, for short) if each nonzero digit is an odd integer with absolute value less than 2w−...
James A. Muir, Douglas R. Stinson
« Prev « First page 3370 / 3584 Last » Next »