Sciweavers

5948 search results - page 183 / 1190
» Computing Robust Counter-Strategies
Sort
View
136
Voted
ICS
2010
Tsinghua U.
16 years 20 days ago
Robustness of the Learning with Errors Assumption
: Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are s...
Shafi Goldwasser, Yael Kalai, Chris Peikert, Vinod...
CVPR
2008
IEEE
15 years 9 months ago
A Loopy Belief Propagation approach for robust background estimation
Background estimation, i.e. automatic recovery of the background image from a sequence of images containing moving foreground objects, is an important module in many applications,...
Xun Xu, Thomas S. Huang
123
Voted
DSN
2008
IEEE
15 years 9 months ago
A robust and lightweight stable leader election service for dynamic systems
We describe the implementation and experimental evaluation of a fault-tolerant leader election service for dynamic systems. Intuitively, distributed applications can use this serv...
Nicolas Schiper, Sam Toueg
135
Voted
WACV
2008
IEEE
15 years 9 months ago
Robust Human Pose Recognition Using Unlabelled Markers
In this paper, we tackle robust human pose recognition using unlabelled markers obtained from an optical marker-based motion capture system. A coarse-to-fine fast pose matching al...
Yi Wang, Gang Qian
127
Voted
DSN
2007
IEEE
15 years 9 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer