Sciweavers

12289 search results - page 164 / 2458
» computing 2006
Sort
View
IJCV
2006
218views more  IJCV 2006»
15 years 3 months ago
Stabilizing the Focal Length Computation for 3-D Reconstruction from Two Uncalibrated Views
In order to reconstruct 3-D shape from two uncalibrated views, one needs to resolve two problems: (i) the computed focal lengths can be imaginary; (ii) the computation fails for fi...
Ken-ichi Kanatani, Atsutada Nakatsuji, Yasuyuki Su...
FOCS
2006
IEEE
15 years 9 months ago
Input-Indistinguishable Computation
We put forward a first definition of general secure computation that, without any trusted set-up, • handles an arbitrary number of concurrent executions; and • is implementa...
Silvio Micali, Rafael Pass, Alon Rosen
CSREAPSC
2006
15 years 4 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
ASC
2008
15 years 3 months ago
Morphic computing
Morphic Computing is based on Field Theory [14-16] and more specifically Morphic Fields. Morphic Fields were first introduced by [18] from his hypothesis of formative causation tha...
Germano Resconi, Masoud Nikravesh
IAJIT
2010
81views more  IAJIT 2010»
15 years 1 months ago
Credit Scoring Models Using Soft Computing Methods: A Survey
: During the last fifteen years, soft computing methods have been successfully applied in building powerful and flexible credit scoring models and have been suggested to be a possi...
Adel Lahsasna, Raja Noor Ainon, Teh Ying Wah