Sciweavers

2230 search results - page 133 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 8 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
IJIIDS
2008
95views more  IJIIDS 2008»
15 years 2 months ago
Tightly-coupled GIS data in GNSS fix computations with integrity testing
: Global Navigation Satellite Systems (GNSS) are often used to localise a receiver with respect to a given map. This association problem, also known as map-matching, is usually add...
Clément Fouque, Philippe Bonnifait
CVPR
2008
IEEE
15 years 8 months ago
View and scale invariant action recognition using multiview shape-flow models
Actions in real world applications typically take place in cluttered environments with large variations in the orientation and scale of the actor. We present an approach to simult...
Pradeep Natarajan, Ram Nevatia
MDM
2009
Springer
115views Communications» more  MDM 2009»
15 years 9 months ago
Supporting Contexts for Indoor Navigation Using a Multilayered Space Model
Indoor navigation highly depends on context and requires flexible data structures to support the many use cases and configurations. For example, an indoor navigation system must c...
Thomas Becker, Claus Nagel, Thomas H. Kolbe
FGR
2000
IEEE
141views Biometrics» more  FGR 2000»
15 years 6 months ago
Multiple Cues used in Model-Based Human Motion Capture
Human motion capture has lately been the object of much attention due to commercial interests. A ”touch free” computer vision solution to the problem is desirable to avoid the...
Thomas B. Moeslund, Erik Granum