Sciweavers

1341 search results - page 238 / 269
» Probabilistic Abstraction Hierarchies
Sort
View
90
Voted
CORR
2006
Springer
104views Education» more  CORR 2006»
14 years 10 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
84
Voted
JCB
2008
108views more  JCB 2008»
14 years 10 months ago
Asymptotics of RNA Shapes
Abstract. RNA shapes, introduced by Giegerich et al. (17), provide a useful classification of the branching complexity for RNA secondary structures. In this paper, we derive an exa...
W. A. Lorenz, Yann Ponty, Peter Clote
89
Voted
PAA
2008
14 years 10 months ago
Recognising facial expressions in video sequences
Abstract We introduce a system that processes a sequence of images of a front-facing human face and recognises a set of facial expressions. We use an efficient appearance-based fac...
José Miguel Buenaposada, Enrique Muñ...
98
Voted
MVA
2006
205views Computer Vision» more  MVA 2006»
14 years 10 months ago
Ontological inference for image and video analysis
Abstract This paper presents an approach to designing and implementing extensible computational models for perceiving systems based on a knowledge-driven joint inference approach. ...
Christopher Town
69
Voted
SIAMAM
2008
74views more  SIAMAM 2008»
14 years 10 months ago
Optimal Liquidation by a Large Investor
Abstract. We develop a partial equilibrium model to investigate the problem of optimal liquidation over a finite or infinite time horizon for an investor with large holdings in a r...
Ajay Subramanian