Sciweavers

635 search results - page 64 / 127
» Some Computational Problems Related to Pseudo-intents
Sort
View
COMBINATORICS
2007
72views more  COMBINATORICS 2007»
14 years 9 months ago
Matrix Partitions with Finitely Many Obstructions
Each m by m symmetric matrix M over 0, 1, ∗, defines a partition problem, in which an input graph G is to be partitioned into m parts with adjacencies governed by M, in the sen...
Tomás Feder, Pavol Hell, Wing Xie
ECCC
2007
123views more  ECCC 2007»
14 years 9 months ago
Lossy Trapdoor Functions and Their Applications
We propose a general cryptographic primitive called lossy trapdoor functions (lossy TDFs), and use it to develop new approaches for constructing several important cryptographic to...
Chris Peikert, Brent Waters
ICIP
2009
IEEE
15 years 10 months ago
Exploiting Local Structure For Tracking Plant Cells In Noisy Images
In this paper, we present a local graph matching based method for tracking cells and cell divisions in noisy images. We work with plant cells, where the cells are tightly clustere...
DAC
1999
ACM
15 years 10 months ago
Customized Instruction-Sets for Embedded Processors
It is generally believed that there will be little more variety in CPU architectures, and thus the design of Instruction-set Architectures (ISAs) will have no role in the future o...
Joseph A. Fisher
PERCOM
2007
ACM
15 years 9 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...