Sciweavers

954 search results - page 67 / 191
» Conditional Risk Mappings
Sort
View
CIDR
2009
152views Algorithms» more  CIDR 2009»
15 years 5 months ago
Visualizing the robustness of query execution
In database query processing, actual run-time conditions (e.g., actual selectivities and actual available memory) very often differ from compile-time expectations of run-time cond...
Goetz Graefe, Harumi A. Kuno, Janet L. Wiener
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 10 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
ICPR
2008
IEEE
15 years 10 months ago
Finite element modeling of facial deformation in videos for computing strain pattern
We present a finite element modeling based approach to compute strain patterns caused by facial deformation during expressions in videos. A sparse motion field computed through ...
Vasant Manohar, Matthew Shreve, Dmitry B. Goldgof,...
ICPR
2008
IEEE
15 years 10 months ago
Symmetric segment-based stereo matching of motion blurred images with illumination variations
Most existing methods of stereo matching focus on dealing with clear image pairs. Consequently, there is a lack of approaches capable of handling degraded images captured under ch...
Wei Wang, Yizhou Wang, Longshe Huo, Qingming Huang...
IROS
2008
IEEE
146views Robotics» more  IROS 2008»
15 years 10 months ago
Incremental vision-based topological SLAM
— In robotics, appearance-based topological map building consists in infering the topology of the environment explored by a robot from its sensor measurements. In this paper, we ...
Adrien Angeli, Stéphane Doncieux, Jean-Arca...