Sciweavers

1000 search results - page 32 / 200
» order 2011
Sort
View
MCPR2
2011
104views more  MCPR2 2011»
14 years 2 months ago
People Detection Using Color and Depth Images
We present a strategy that combines color and depth images to detect people in indoor environments. Similarity of image appearance and closeness in 3D position over time yield weig...
Joaquín Salas, Carlo Tomasi
ICCV
2011
IEEE
13 years 12 months ago
Semantic Contours from Inverse Detectors
We study the challenging problem of localizing and classifying category-specific object contours in real world images. For this purpose, we present a simple yet effective method ...
Bharath Hariharan, Pablo Arbelaez, Lubomir Bourdev...
IACR
2011
114views more  IACR 2011»
13 years 11 months ago
Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three
Abstract. This paper proposes new explicit formulae for the point doubling, tripling and addition on ordinary Weierstrass elliptic curves with a point of order 3 over finite fiel...
Hongfeng Wu, Changan Zhao
IACR
2011
146views more  IACR 2011»
13 years 11 months ago
Identity-based Digital Signature Scheme Without Bilinear Pairings
: Many identity-based digital signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher th...
Debiao He, Jianhua Chen, Jin Hu
IACR
2011
116views more  IACR 2011»
13 years 11 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev