Sciweavers

1620 search results - page 227 / 324
» eg 2010
Sort
View
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 8 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
ACCV
2010
Springer
14 years 6 months ago
Optimizing Visual Vocabularies Using Soft Assignment Entropies
The state of the art for large database object retrieval in images is based on quantizing descriptors of interest points into visual words. High similarity between matching image r...
Yubin Kuang, Kalle Åström, Lars Kopp, M...
ACMACE
2010
ACM
14 years 6 months ago
Tangible anchoring: grasping news and public opinion
Tangible Anchoring explores potential practices for news reporting and analysis afforded by the convergence of tabletop computing forms, broadcast media, and user-generated conten...
Susan J. Robinson, Sam Mendenhall, Vedrana Novosel...
APVIS
2010
14 years 6 months ago
Visual analysis of high dimensional point clouds using topological landscapes
In this paper, we present a novel three-stage process to visualize the structure of point clouds in arbitrary dimensions. To get insight into the structure and complexity of a dat...
Patrick Oesterling, Christian Heine, Heike Jä...
BMVC
2010
14 years 6 months ago
Multi-View Planning for Simultaneous Coverage and Accuracy Optimisation
View planning for three-dimensional (3D) reconstruction and inspection solves the problem of finding an efficient sequence of views allowing complete and high quality reconstructi...
Christoph Munkelt, Andreas Breitbarth, Gunther Not...