Sciweavers

12052 search results - page 2141 / 2411
» computer 2010
Sort
View
115
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
113
Voted
ICIP
2010
IEEE
14 years 10 months ago
Randomized motion estimation
Motion estimation is known to be a non-convex optimization problem. This non-convexity comes from several ambiguities in motion estimation such as the aperture problem, or fast mo...
Sylvain Boltz, Frank Nielsen
122
Voted
CLEIEJ
2010
14 years 10 months ago
Logic Programming: Can the learning and teaching process be improved apart from standards adopted by most professors and establi
Logic programming is one of the most important subjects for students pursuing a degree in Information Technology and Communication (ITC) at higher education institutions. Teaching ...
Ricardo Luiz B. L. Campos
106
Voted
CLEIEJ
2010
14 years 10 months ago
A Query Language for Data Access in Ubiquitous Environments
Recent progress in ubiquitous computing technology is allowing development of new and sophisticated applications that are now able to store very large data on the mobile device it...
Cristiano Silveira, Leonardo Eloy, Jose Maria Mont...
93
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 10 months ago
Recognition of Non-Compound Handwritten Devnagari Characters using a Combination of MLP and Minimum Edit Distance
This paper deals with a new method for recognition of offline Handwritten noncompound Devnagari Characters in two stages. It uses two well known and established pattern recognitio...
Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipu...
« Prev « First page 2141 / 2411 Last » Next »