Sciweavers

2035 search results - page 221 / 407
» Working memory
Sort
View
158
Voted
CORR
2011
Springer
161views Education» more  CORR 2011»
14 years 11 months ago
Generalized Gray Codes for Local Rank Modulation
—We consider the local rank-modulation scheme in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. Local rankmodulation is...
Eyal En Gad, Michael Langberg, Moshe Schwartz, Jeh...
TMI
2010
298views more  TMI 2010»
14 years 10 months ago
An Efficient Numerical Method for General Lp Regularization in Fluorescence Molecular Tomography
Abstract--Reconstruction algorithms for fluorescence tomography have to address two crucial issues : (i) the ill-posedness of the reconstruction problem, (ii) the large scale of nu...
Jean-Charles Baritaux, Kai Hassler, Michael Unser
ISMM
2011
Springer
14 years 6 months ago
Surface Reconstruction Using Power Watershed
Abstract. Surface reconstruction from a set of noisy point measurements has been a well studied problem for several decades. Recently, variational and discrete optimization approac...
Camille Couprie, Xavier Bresson, Laurent Najman, H...
150
Voted
CCS
2011
ACM
14 years 3 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
IACR
2011
116views more  IACR 2011»
14 years 3 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev