Sciweavers

288 search results - page 51 / 58
» random 1998
Sort
View
PAMI
1998
141views more  PAMI 1998»
15 years 6 hour ago
A Probabilistic Approach to the Coupled Reconstruction and Restoration of Underwater Acoustic Images
—This paper describes a probabilistic technique for the coupled reconstruction and restoration of underwater acoustic images. The technique is founded on the physics of the image...
Vittorio Murino, Andrea Trucco, Carlo S. Regazzoni
96
Voted
TCAD
1998
82views more  TCAD 1998»
15 years 1 hour ago
LOT: Logic Optimization with Testability. New transformations for logic synthesis
—A new approach to optimize multilevel logic circuits is introduced. Given a multilevel circuit, the synthesis method optimizes its area while simultaneously enhancing its random...
Mitrajit Chatterjee, Dhiraj K. Pradhan, Wolfgang K...
TIT
1998
79views more  TIT 1998»
14 years 12 months ago
Capacity of Two-Layer Feedforward Neural Networks with Binary Weights
— The lower and upper bounds for the information capacity of two-layer feedforward neural networks with binary interconnections, integer thresholds for the hidden units, and zero...
Chuanyi Ji, Demetri Psaltis
TON
1998
92views more  TON 1998»
14 years 12 months ago
Local error recovery in SRM: comparison of two approaches
—Scalable reliable multicast (SRM) is a framework for reliable multicast delivery. In order to maximize the collaboration among the group members in error recovery, both retransm...
Ching-Gung Liu, Deborah Estrin, Scott Shenker, Lix...
TIT
2011
125views more  TIT 2011»
14 years 7 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud