Sciweavers

2997 search results - page 188 / 600
» Fuzzy robustness analysis
Sort
View
CN
2006
117views more  CN 2006»
15 years 5 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
JMM2
2007
127views more  JMM2 2007»
15 years 4 months ago
Robust Face Recognition through Local Graph Matching
— A novel face recognition method is proposed, in which face images are represented by a set of local labeled graphs, each containing information about the appearance and geometr...
Ehsan Fazl Ersi, John S. Zelek, John K. Tsotsos
AUTOMATICA
1999
119views more  AUTOMATICA 1999»
15 years 4 months ago
Robust L2-gain control for nonlinear systems with projection dynamics and input constraints: an example from traffic control
We formulate the L2-gain control problem for a general nonlinear, state-space system with projection dynamics in the state evolution and hard constraints on the set of admissible ...
Joseph A. Ball, Martin V. Day, Tungsheng Yu, Pushk...
ICIP
2009
IEEE
15 years 2 months ago
An efficient and robust sequential algorithm for background estimation in video surveillance
Many computer vision algorithms such as object tracking and event detection assume that a background model of the scene under analysis is known. However, in many practical circums...
Vikas Reddy, Conrad Sanderson, Brian C. Lovell
IWDW
2005
Springer
15 years 10 months ago
Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis
In this paper, we propose a robust watermarking method for 3-D triangle surface meshes. Most previous methods based on the wavelet analysis can process only semi-regular meshes. Ou...
Min-Su Kim, Sébastien Valette, Ho-Youl Jung...