Sciweavers

5948 search results - page 299 / 1190
» Computing Robust Counter-Strategies
Sort
View
DSOM
2000
Springer
15 years 8 months ago
The Doctor Is In: Helping End Users Understand the Health of Distributed Systems
Abstract. Users need know nothing of the internals of distributed applications that are performing well. However, when performance flags or fails, a depiction of system behavior f...
Paul Dourish, Daniel C. Swinehart, Marvin Theimer
CONEXT
2008
ACM
15 years 6 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
CCCG
2010
15 years 6 months ago
On degeneracy of lower envelopes of algebraic surfaces
We analyze degeneracy of lower envelopes of algebraic surfaces. We focus on the cases omitted in the existing complexity analysis of lower envelopes [Halperin and Sharir 1993], an...
Kimikazu Kato
CVPR
1998
IEEE
16 years 6 months ago
Making Good Features Track Better
This paper addresses robust feature tracking. We extend the well-known Shi-Tomasi-Kanade tracker by introducing an automatic scheme for rejecting spurious features. We employ a si...
Tiziano Tommasini, Andrea Fusiello, Emanuele Trucc...
ICPR
2004
IEEE
16 years 5 months ago
Coordinate Systems Reconstruction for Graphical Documents by Hough-feature Clustering and Geometric Analysis
Two-dimensional and three-dimensional coordinate systems are the basic graphics symbols in many graphical documents. A robust coordinate system detection scheme is needed in order...
Chew Lim Tan, Yan Ping Zhou