Sciweavers

3091 search results - page 194 / 619
» The Color Between Two Others
Sort
View
142
Voted
DAGSTUHL
2006
15 years 5 months ago
The complexity of Boolean functions from cryptographic viewpoint
Cryptographic Boolean functions must be complex to satisfy Shannon's principle of confusion. But the cryptographic viewpoint on complexity is not the same as in circuit compl...
Claude Carlet
SSWMC
2004
15 years 5 months ago
New attacks on SARI image authentication system
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin
MVA
2000
139views Computer Vision» more  MVA 2000»
15 years 5 months ago
Automatic Intruder Detection and Tracking System with Pan-Tilt-Zoom Camera
We propose an automatic monitoring system which detects and tracks intruders, using a pan-tiltzoom camera. Detection is based on a background subtraction method which detects the ...
Tetsuji Haga, Hideto Fujiwara, Kazuhiko Sumi
EOR
2010
114views more  EOR 2010»
15 years 4 months ago
Technology choice under several uncertainty sources
We analyze a model of irreversible investment with two sources of uncertainty. A riskneutral decision maker has the choice between two mutually exclusive projects under input pric...
Catherine Bobtcheff, Stéphane Villeneuve
145
Voted
COMBINATORICS
2006
123views more  COMBINATORICS 2006»
15 years 4 months ago
The Non-Crossing Graph
Two sets are non-crossing if they are disjoint or one contains the other. The noncrossing graph NCn is the graph whose vertex set is the set of nonempty subsets of [n] = {1, . . ....
Nathan Linial, Michael E. Saks, David Statter