Sciweavers

5948 search results - page 38 / 1190
» Computing Robust Counter-Strategies
Sort
View
AAAI
2012
13 years 6 days ago
Robust Cuts Over Time: Combatting the Spread of Invasive Species with Unreliable Biological Control
Widespread accounts of the harmful effects of invasive species have stimulated both practical and theoretical studies on how the spread of these destructive agents can be containe...
Gwen Spencer
CRYPTO
2006
Springer
97views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Robust Multiparty Computation with Linear Communication Complexity
We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a polytime adversary, and allows n parties to actively secur...
Martin Hirt, Jesper Buus Nielsen
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering
Abstract— Large-scale ubiquitous computing environments require scalable and robust service discovery to enable “anytime, anywhere” computing, which is hard to be satisfied ...
Wei Gao
ICMLA
2003
14 years 11 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
CONTEXT
2003
Springer
15 years 3 months ago
GRAVA: An Architecture Supporting Automatic Context Transitions and Its Application to Robust Computer Vision
We describe a software development approach for vision that enhances robustness by making novel use of context. Conventional approaches to most image understanding problems suffe...
Paul Robertson, Robert Laddaga