Results 1  10
of
4,363
A combined corner and edge detector
 In Proc. of Fourth Alvey Vision Conference
, 1988
"... Consistency of image edge filtering is of prime importance for 3D interpretation of image sequences using feature tracking algorithms. To cater for image regions containing texture and isolated features, a combined corner and edge detector based on the local autocorrelation function is utilised, an ..."
Abstract

Cited by 2453 (2 self)
 Add to MetaCart
Consistency of image edge filtering is of prime importance for 3D interpretation of image sequences using feature tracking algorithms. To cater for image regions containing texture and isolated features, a combined corner and edge detector based on the local autocorrelation function is utilised
A method for obtaining digital signatures and publickey cryptosystems.
 Communications of the ACM,
, 1978
"... Abstract An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can be encip ..."
Abstract

Cited by 3894 (24 self)
 Add to MetaCart
Abstract An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can
An assumptionbased truthmaintenance system
 Artificial Intelligence
, 1986
"... In this paper we (1) define the concept of a Clause Managetnent System (CMS) — a generaizatiou of de Kleer’s ATMS, (2) motivate such systems in terms of efficiency of search and abductive reasoning, and (3) characterize the computation affected by a CMS in terms of the concept of prime implicants. ..."
Abstract

Cited by 334 (11 self)
 Add to MetaCart
In this paper we (1) define the concept of a Clause Managetnent System (CMS) — a generaizatiou of de Kleer’s ATMS, (2) motivate such systems in terms of efficiency of search and abductive reasoning, and (3) characterize the computation affected by a CMS in terms of the concept of prime implicants
Lower Bounds for Discrete Logarithms and Related Problems
, 1997
"... . This paper considers the computational complexity of the discrete logarithm and related problems in the context of "generic algorithms"that is, algorithms which do not exploit any special properties of the encodings of group elements, other than the property that each group element is ..."
Abstract

Cited by 288 (11 self)
 Add to MetaCart
is encoded as a unique binary string. Lower bounds on the complexity of these problems are proved that match the known upper bounds: any generic algorithm must perform\Omega (p 1=2 ) group operations, where p is the largest prime dividing the order of the group. Also, a new method for correcting a faulty
Language and Memory
 Cognitive Science
, 1980
"... This paper outlines some of the issues and basic philosophy that have guided my work and that of my students in the last ten years. It describes the progression of conceptual representational theories developed during that time, as well OS some of the research models built to implement those theorie ..."
Abstract

Cited by 246 (4 self)
 Add to MetaCart
but are considered to be of prime importance. Many linguists have abandoned their overriding concern with syntax for a more balanced view of language phenomena. Psychologists are *I would like to thank the following people for their help both in the writing of and the
The effect of network topology on the spread of epidemics
 IN IEEE INFOCOM
, 2005
"... Many network phenomena are well modeled as spreads of epidemics through a network. Prominent examples include the spread of worms and email viruses, and, more generally, faults. Many types of information dissemination can also be modeled as spreads of epidemics. In this paper we address the question ..."
Abstract

Cited by 216 (8 self)
 Add to MetaCart
the hypercube, which is a representative connectivity graph for a distributed hash table, the complete graph, which is an important connectivity graph for BGP, and the power law graph, of which the ASlevel Internet graph is a prime example. We also study the star topology and the ErdősRényi graph
Linear equations in primes
 ANNALS OF MATHEMATICS
, 2006
"... Consider a system Ψ of nonconstant affinelinear forms ψ1,..., ψt: Z d → Z, no two of which are linearly dependent. Let N be a large integer, and let K ⊆ [−N, N] d be convex. A generalisation of a famous and difficult open conjecture of Hardy and Littlewood predicts an asymptotic, as N → ∞, for th ..."
Abstract

Cited by 79 (3 self)
 Add to MetaCart
simultaneous linear system of equations, in which all unknowns are required to be prime. In this paper we (conditionally) verify this asymptotic under the assumption that no two of the affinelinear forms ψ1,..., ψt are affinely related; this excludes the important “binary ” cases such as the twin prime
Spreading activation versus compound cue accounts of priming: Mediated priming revisited
 Journal of Experimental Psychology: Learning, Memory, and Cognition
, 1992
"... Spreading activation theories and compound cue theories have both been proposed as accounts of priming phenomena. According to spreading activation theories, the amount of activation that spreads between a prime and a target should be a function of the number of mediating links between the prime and ..."
Abstract

Cited by 81 (6 self)
 Add to MetaCart
on the familiarity of the prime and target as a compound, where the compound is formed by the simultaneous presence of the prime and target in shortterm memory as a test item. An important function of memory is to provide the information necessary for an integrated understanding of the various objects that we
Analysis of Inheritance Anomaly in ObjectOriented Concurrent Programming Languages
, 1993
"... It has been pointed out that inheritance and synchronization constraints in concurrent object systems often conflict with each other, resulting in inheritance anomaly where redefinitions of inherited methods are necessary in order to maintain the integrity of concurrent objects. The anomaly is seri ..."
Abstract

Cited by 180 (2 self)
 Add to MetaCart
, and review several proposals for minimizing the unwanted effect of this phenomenon. In particular, we propose (partial) solutions using (1) computational reflection, and (2) transactions in OOCP languages. 1 Introduction Inheritance is the prime language feature in sequential OO (ObjectOriented) languages
Video case report Vasovagal syncope
, 2006
"... misdiagnosed as epilepsy for 17 years: prime importance of clinical history ..."
Abstract
 Add to MetaCart
misdiagnosed as epilepsy for 17 years: prime importance of clinical history
Results 1  10
of
4,363