Sciweavers

644 search results - page 66 / 129
» A topological characterization of weakness
Sort
View
ICIP
2005
IEEE
16 years 1 months ago
Novel likelihood estimation technique based on boosting detector
This paper presents novel likelihood estimation to be used for particle filter based object tracking. The likelihood estimation is built upon cascade object detector trained with ...
Haijing Wang, Peihua Li, Tianwen Zhang
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
15 years 6 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
ICRA
2007
IEEE
135views Robotics» more  ICRA 2007»
15 years 6 months ago
Robotic Electrolocation: Active Underwater Target Localization with Electric Fields
— We explore the capabilities of a robot designed to locate objects underwater through active movement of an electric field emitter and sensor apparatus. The robot is inspired b...
James R. Solberg, Kevin M. Lynch, Malcolm A. MacIv...
HYBRID
2007
Springer
15 years 6 months ago
Computational Approaches to Reachability Analysis of Stochastic Hybrid Systems
This work investigates some of the computational issues involved in the solution of probabilistic reachability problems for discretetime, controlled stochastic hybrid systems. It i...
Alessandro Abate, Saurabh Amin, Maria Prandini, Jo...
CALCO
2005
Springer
126views Mathematics» more  CALCO 2005»
15 years 5 months ago
Context-Free Languages via Coalgebraic Trace Semantics
In this paper we identify context-free grammars as coalgebras. To obtain the associated context-free languages (consisting of only finite-length strings) we introduce a general a...
Ichiro Hasuo, Bart Jacobs