Sciweavers

66 search results - page 10 / 14
» Secure Linear Algebra Using Linearly Recurrent Sequences
Sort
View
IVC
2002
141views more  IVC 2002»
14 years 9 months ago
Real-time gesture recognition system and application
In this paper, we consider a vision-based system that can interpret a user's gestures in real time to manipulate windows and objects within a graphical user interface. A hand...
Chan Wah Ng, Surendra Ranganath
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
14 years 4 months ago
Left invertibility of output-quantized systems: An application to cryptography
ABSTRACT. In this paper a secure communication method is proposed, based on left invertibility of output-quantized dynamical systems. The sender uses an output-quantized linear sys...
Nevio Dubbini, Anna Carluccio, Antonio Bicchi
ARSCOM
2007
65views more  ARSCOM 2007»
14 years 10 months ago
Odd and Even Dominating Sets with Open Neighborhoods
A subset D of the vertex set V of a graph is called an open oddd dominating set if each vertex in V is adjacent to an odd number of vertices in D (adjacency is irreflexive). In t...
John L. Goldwasser, William Klostermeyer
ASIACRYPT
2000
Springer
15 years 2 months ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
ECCV
2000
Springer
15 years 11 months ago
A Six Point Solution for Structure and Motion
The paper has two main contributions: The rst is a set of methods for computing structure and motion for m 3 views of 6 points. It is shown that a geometric image error can be mini...
Frederik Schaffalitzky, Andrew Zisserman, Richard ...