Sciweavers

1190 search results - page 29 / 238
» Scalable Active Matching
Sort
View
CRYPTO
2008
Springer
76views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmical...
Ivan Damgård, Yuval Ishai, Mikkel Krø...
68
Voted
ICPR
2000
IEEE
15 years 10 months ago
Epipolar Geometry from the Deformation of an Active Contour
An active contour is used to track a target in a sequence recorded by a walking robot in an unstructured scene . The deformations of the contour are analysed in order to extract t...
Elisa Martínez, Carme Torras
ISCAS
2003
IEEE
124views Hardware» more  ISCAS 2003»
15 years 2 months ago
An active leakage-injection scheme applied to low-voltage SRAMs
ABSTRACT: An active leakage-injection scheme (ALIS) for lowvoltage (LV) high-density (HD) SRAMs is presented. By means of a feedback loop comprising a servo-amplifier and a commond...
Jader A. De Lima
BMVC
2002
15 years 2 days ago
Comparing Variations on the Active Appearance Model Algorithm
The Active Appearance Model (AAM) algorithm has proved to be a successful method for matching statistical models of appearance to new images. Since the original algorithm was desc...
Timothy F. Cootes, Panachit Kittipanya-ngam
75
Voted
ICCS
2005
Springer
15 years 3 months ago
Highly Scalable Algorithms for Robust String Barcoding
: String barcoding is a recently introduced technique for genomic based identification of microorganisms. In this paper we describe the engineering of highly scalable algorithms fo...
Bhaskar DasGupta, Kishori M. Konwar, Ion I. Mandoi...