Sciweavers

DAM
2016
74views more  DAM 2016»
10 years 3 days ago
Trichotomy for integer linear systems based on their sign patterns
In this paper, we consider solving the integer linear systems, i.e., given a matrix A ∈ Rm×n , a vector b ∈ Rm , and a positive integer d, to compute an integer vector x ∈ ...
Kei Kimura, Kazuhisa Makino
CVIU
2016
54views Cryptology» more  CVIU 2016»
10 years 3 days ago
Higher order maximum persistency and comparison theorems
We address combinatorial problems that can be formulated as minimization of a partially separable function of discrete variables (energy minimization in graphical models, weighted...
Alexander Shekhovtsov
CVIU
2016
70views Cryptology» more  CVIU 2016»
10 years 3 days ago
Semantic super-resolution: When and where is it useful?
Recent algorithms for exemplar-based single image super-resolution have shown impressive results, mainly due to well-chosen priors and recently also due to more accurate blur kern...
Radu Timofte, Vincent De Smet, Luc Van Gool
CVIU
2016
52views Cryptology» more  CVIU 2016»
10 years 3 days ago
Sequential Interval Network for parsing complex structured activity
We propose a new graphical model, called Sequential Interval Network (SIN), for parsing complex structured activity whose composition can be represented as a string-length limited...
Nam N. Vo, Aaron F. Bobick
180
Voted
CVIU
2016
78views Cryptology» more  CVIU 2016»
10 years 3 days ago
Fisher Kernel Temporal Variation-based Relevance Feedback for video retrieval
This paper proposes a novel framework for Relevance Feedback based on the Fisher Kernel (FK). Specifically, we train a Gaussian Mixture Model (GMM) on the top retrieval results (...
Ionut Mironica, Bogdan Ionescu, Jasper R. R. Uijli...
CVIU
2016
63views Cryptology» more  CVIU 2016»
10 years 3 days ago
Local Higher-Order Statistics (LHS) describing images with statistics of local non-binarized pixel patterns
We propose a new image representation for texture categorization and facial analysis, relying on the use of higher-order local differential statistics as features. It has been re...
Gaurav Sharma 0004, Frédéric Jurie
CVIU
2016
55views Cryptology» more  CVIU 2016»
10 years 3 days ago
Interdigital palm region for biometric identification
— The interdigital palm region represents about 30% of the palm area and is inherently acquired during palmprint imaging, nevertheless it has not yet attracted any noticeable att...
Aythami Morales, Ajay Kumar, Miguel A. Ferrer
CTRSA
2016
Springer
80views Cryptology» more  CTRSA 2016»
10 years 3 days ago
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and...
Colin Boyd, Britta Hale, Stig Frode Mjølsne...
CTRSA
2016
Springer
58views Cryptology» more  CTRSA 2016»
10 years 3 days ago
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
The purpose of this paper is to compare side-by-side the NTRU and BGV schemes in their non-scale invariant (messages in the lower bits), and their scale invariant (message in the u...
Ana Costache, Nigel P. Smart