Sciweavers

5580 search results - page 764 / 1116
» Randomized priority algorithms
Sort
View
160
Voted
QEST
2007
IEEE
15 years 10 months ago
Symbolic Bisimulations for Probabilistic Systems
The paper introduces symbolic bisimulations for a simple probabilistic π-calculus to overcome the infinite branching problem that still exists in checking ground bisimulations b...
Peng Wu 0002, Catuscia Palamidessi, Huimin Lin
139
Voted
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 10 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
123
Voted
WACV
2007
IEEE
15 years 10 months ago
Extraction of Person Silhouettes from Surveillance Imagery using MRFs
We present a method for the simultaneous detection and segmentation of objects from static images. We employ lowlevel contour features that enable us to learn the coarse object sh...
Vinay Sharma, James W. Davis
110
Voted
COLT
2007
Springer
15 years 10 months ago
Occam's Hammer
Abstract. We establish a generic theoretical tool to construct probabilistic bounds for algorithms where the output is a subset of objects from an initial pool of candidates (or mo...
Gilles Blanchard, François Fleuret
136
Voted
CSCLP
2007
Springer
15 years 10 months ago
A Global Filtration for Satisfying Goals in Mutual Exclusion Networks
We formulate a problem of goal satisfaction in mutex networks in this paper. The proposed problem is motivated by problems that arise in concurrent planning. For more efficient sol...
Pavel Surynek