Sciweavers

401 search results - page 42 / 81
» Random Early Marking
Sort
View
89
Voted
ECIR
2008
Springer
15 years 1 months ago
Workshop on Novel Methodologies for Evaluation in Information Retrieval
Information retrieval is an empirical science; the field cannot move forward unless there are means of evaluating the innovations devised by researchers. However the methodologies...
Mark Sanderson, Martin Braschler, Nicola Ferro, Ju...
96
Voted
ICICS
2009
Springer
15 years 7 months ago
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
Abstract. We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear err...
Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Jos...
94
Voted
ICDIM
2007
IEEE
15 years 6 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
88
Voted
ISSAC
2007
Springer
93views Mathematics» more  ISSAC 2007»
15 years 6 months ago
Approximate bivariate factorization: a geometric viewpoint
We briefly present and analyze, from a geometric viewpoint, strategies for designing algorithms to factor bivariate approximate polynomials in   [x, y]. Given a composite polyno...
André Galligo, Mark van Hoeij
52
Voted
ICRA
2006
IEEE
70views Robotics» more  ICRA 2006»
15 years 6 months ago
Pushing using Compliance
— This paper addresses the problem of maneuvering an object by pushing it through an environment with obstacles. Instead of only pushing the object through open spaces, we also a...
Dennis Nieuwenhuisen, A. Frank van der Stappen, Ma...