Sciweavers

544 search results - page 64 / 109
» What cannot be computed locally!
Sort
View
88
Voted
STACS
1992
Springer
15 years 4 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
CVPR
2004
IEEE
16 years 2 months ago
Shedding Light on Stereoscopic Segmentation
We propose a variational algorithm to jointly estimate the shape, albedo, and light configuration of a Lambertian scene from a collection of images taken from different vantage po...
Hailin Jin, Daniel Cremers, Anthony J. Yezzi, Stef...
105
Voted
ECCV
2002
Springer
16 years 2 months ago
Resolution Selection Using Generalized Entropies of Multiresolution Histograms
The performances of many image analysis tasks depend on the image resolution at which they are applied. Traditionally, resolution selection methods rely on spatial derivatives of i...
Efstathios Hadjidemetriou, Michael D. Grossberg, S...
RECOMB
2002
Springer
16 years 26 days ago
Provably sensitive Indexing strategies for biosequence similarity search
The field of algorithms for pairwisc biosequence similarity search is dominated by heuristic methods of high efficiency but uncertain sensitivity. One reason that more formal stri...
Jeremy Buhler
91
Voted
MOBISYS
2003
ACM
16 years 4 days ago
Reservations for Conflict Avoidance in a Mobile Database System
Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...
Nuno M. Preguiça, José Legatheaux Ma...