Sciweavers

5948 search results - page 386 / 1190
» Computing Robust Counter-Strategies
Sort
View
PLDI
2009
ACM
15 years 12 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
INFORMS
2000
128views more  INFORMS 2000»
15 years 4 months ago
A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization
We develop a variant of the Nelder-Mead (NM) simplex search procedure for stochastic simulation optimization that is designed to avoid many of the weaknesses encumbering such dire...
David G. Humphrey, James R. Wilson
PAA
2002
15 years 4 months ago
Layered Representation of a Video Shot with Mosaicing
: This paper presents a motion segmentation method useful for representing efficiently a video shot as a static mosaic of the background plus sequences of the objects moving in the...
Emanuele Trucco, Francesca Odone, Andrea Fusiello
PC
2002
118views Management» more  PC 2002»
15 years 4 months ago
Parallel algorithms for indefinite linear systems
Saddle-point problems give rise to indefinite linear systems that are challenging to solve via iterative methods. This paper surveys two recent techniques for solving such problem...
Ahmed H. Sameh, Vivek Sarin
TIP
1998
129views more  TIP 1998»
15 years 4 months ago
Minimax partial distortion competitive learning for optimal codebook design
— The design of the optimal codebook for a given codebook size and input source is a challenging puzzle that remains to be solved. The key problem in optimal codebook design is h...
Ce Zhu, Lai-Man Po