Sciweavers

591 search results - page 74 / 119
» Simulation Input Updating Using Bayesian Techniques
Sort
View
EUROCRYPT
2007
Springer
15 years 1 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
MICCAI
2007
Springer
15 years 4 months ago
A Probabilistic Framework for Tracking Deformable Soft Tissue in Minimally Invasive Surgery
The use of vision based algorithms in minimally invasive surgery has attracted significant attention in recent years due to its potential in providing in situ 3D tissue deformation...
Peter Mountney, Benny P. L. Lo, Surapa Thiemjarus,...
71
Voted
HICSS
2005
IEEE
170views Biometrics» more  HICSS 2005»
15 years 3 months ago
Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
DATE
2008
IEEE
168views Hardware» more  DATE 2008»
15 years 4 months ago
Cycle-approximate Retargetable Performance Estimation at the Transaction Level
This paper presents a novel cycle-approximate performance estimation technique for automatically generated transaction level models (TLMs) for heterogeneous multicore designs. The...
Yonghyun Hwang, Samar Abdi, Daniel Gajski
JVCA
2007
125views more  JVCA 2007»
14 years 9 months ago
Crowd motion capture
In this paper a new and original technique to animate a crowd of human beings is presented. Following the success of data-driven animation models (such as motion capture) in the c...
Nicolas Courty, Thomas Corpetti