Sciweavers

475 search results - page 25 / 95
» Z3-Connectivity with Independent Number 2
Sort
View
108
Voted
ICCV
2005
IEEE
15 years 5 months ago
Bayesian Body Localization Using Mixture of Nonlinear Shape Models
We present a 2D model-based approach to localizing human body in images viewed from arbitrary and unknown angles. The central component is a statistical shape representation of th...
Jiayong Zhang, Robert T. Collins, Yanxi Liu
APPROX
2004
Springer
125views Algorithms» more  APPROX 2004»
15 years 5 months ago
Strong Refutation Heuristics for Random k-SAT
A simple first moment argument shows that in a randomly chosen k-SAT formula with m clauses over n boolean variables, the fraction of satisfiable clauses is 1−2−k +o(1) as m/...
Amin Coja-Oghlan, Andreas Goerdt, André Lan...
121
Voted
MMAS
2011
Springer
14 years 2 months ago
Sweeping Preconditioner for the Helmholtz Equation: Moving Perfectly Matched Layers
This paper introduces a new sweeping preconditioner for the iterative solution of the variable coefficient Helmholtz equation in two and three dimensions. The algorithms follow th...
Björn Engquist, Lexing Ying
ENDM
2007
111views more  ENDM 2007»
14 years 11 months ago
Claw-free circular-perfect graphs
The circular chromatic number of a graph is a well-studied refinement of the chromatic number. Circular-perfect graphs is a superclass of perfect graphs defined by means of this...
Arnaud Pêcher, Xuding Zhu
111
Voted
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 5 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak