Sciweavers

1282 search results - page 201 / 257
» Signing on signing off
Sort
View
110
Voted
ICCV
1999
IEEE
15 years 5 months ago
Real-Time Object Detection for "Smart" Vehicles
This paper presents an e cient shape-based object detection method based on Distance Transforms and describes its use for real-time vision on-board vehicles. The method uses a tem...
Dariu Gavrila, Vasanth Philomin
104
Voted
EUROCRYPT
1999
Springer
15 years 5 months ago
An Analysis of Exponentiation Based on Formal Languages
A recoding rule for exponentiation is a method for reducing the cost of the exponentiation ae by reducing the number of required multiplications. If w(e) is the (hamming) weight of...
Luke O'Connor
104
Voted
SCALESPACE
1999
Springer
15 years 5 months ago
Nonlinear PDEs and Numerical Algorithms for Modeling Levelings and Reconstruction Filters
In this paper we develop partial differential equations (PDEs) that model the generation of a large class of morphological filters, the levelings and the openings/closings by rec...
Petros Maragos, Fernand Meyer
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 5 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
ESORICS
1994
Springer
15 years 4 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen