Sciweavers

23988 search results - page 4650 / 4798
» Social Network Computing
Sort
View
158
Voted
PAMI
2011
14 years 6 months ago
Higher-Dimensional Affine Registration and Vision Applications
—Affine registration has a long and venerable history in computer vision literature, and in particular, extensive work has been done for affine registration in IR2 and IR3 . This...
S. M. Nejhum Shahed, Yu-Tseh Chi, Jeffrey Ho, Ming...
167
Voted
EGH
2011
Springer
14 years 3 months ago
Lossless Compression of Already Compressed Textures
Texture compression helps rendering by reducing the footprint in graphics memory, thus allowing for more textures, and by lowering the number of memory accesses between the graphi...
Jacob Ström, Per Wennersten
147
Voted
ICPADS
2005
IEEE
15 years 9 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
150
Voted
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
16 years 4 months ago
Scalable pseudo-likelihood estimation in hybrid random fields
Learning probabilistic graphical models from high-dimensional datasets is a computationally challenging task. In many interesting applications, the domain dimensionality is such a...
Antonino Freno, Edmondo Trentin, Marco Gori
100
Voted
GI
2007
Springer
15 years 9 months ago
Fahrzeuganbindungen durch Standard-IT-Verfahren
: Der folgende Text beschreibt im ersten Teil die bisher bei PC-Systemen eingesetzten Verfahren zum Zugriff auf Fahrzeugnetzwerke am Beispiel des Controller Area Network ‚CAN’ ...
Oliver Hartkopp
« Prev « First page 4650 / 4798 Last » Next »