Sciweavers

755 search results - page 32 / 151
» group 2003
Sort
View
ICCV
2003
IEEE
15 years 11 months ago
Learning a Classification Model for Segmentation
We propose a two-class classification model for grouping. Human segmented natural images are used as positive examples. Negative examples of grouping are constructed by randomly m...
Xiaofeng Ren, Jitendra Malik
CANS
2009
Springer
121views Cryptology» more  CANS 2009»
15 years 4 months ago
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
Marc Joye
91
Voted
ICDM
2003
IEEE
115views Data Mining» more  ICDM 2003»
15 years 3 months ago
Icon-based Visualization of Large High-Dimensional Datasets
High dimensional data visualization is critical to data analysts since it gives a direct view of original data. We present a method to visualize large amount of high dimensional d...
Ping Chen, Chenyi Hu, Wei Ding 0003, Heloise Lynn,...
ISCC
2003
IEEE
123views Communications» more  ISCC 2003»
15 years 3 months ago
Multicast Congestion Control for Multimedia Collaborative Applications in Packet Switched Networks
We investigate the problem of congestion control for multicast traffic over datagram packet switched networks and present an end-to-end solution to it. The focus of our study is o...
Emad Eldin Mohamed, Hussein M. Abdel-Wahab
SAINT
2003
IEEE
15 years 3 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta