Sciweavers

2340 search results - page 55 / 468
» Second quarter 2008
Sort
View
TMC
2010
161views more  TMC 2010»
14 years 10 months ago
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
—Secret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropp...
Neal Patwari, Jessica Croft, Suman Jana, Sneha Kum...
TMI
2010
123views more  TMI 2010»
14 years 10 months ago
Fast Exact/Quasi-Exact FBP Algorithms for Triple-Source Helical Cone-Beam CT
Abstract—Cardiac computed tomography (CT) has been improved over past years, but it still needs improvement for higher temporal resolution in the cases of high or irregular cardi...
Yang Lu, Alexander Katsevich, Jun Zhao, Hengyong Y...
CVPR
2008
IEEE
16 years 1 months ago
Shape priors in variational image segmentation: Convexity, Lipschitz continuity and globally optimal solutions
In this work, we introduce a novel implicit representation of shape which is based on assigning to each pixel a probability that this pixel is inside the shape. This probabilistic...
Daniel Cremers, Frank R. Schmidt, Frank Barthel
CADE
2008
Springer
16 years 3 days ago
Proof Systems for Effectively Propositional Logic
We consider proof systems for effectively propositional logic. First, we show that propositional resolution for effectively propositional logic may have exponentially longer refuta...
Andrei Voronkov, Juan Antonio Navarro Pérez
DCC
2008
IEEE
15 years 11 months ago
Effective Visual Masking Techniques in JPEG2000
This paper introduces a very low complexity visual masking algorithm for the JPEG2000 image compression standard and evaluates its impact on the visual image quality by means of t...
Thomas Richter