Sciweavers

5580 search results - page 877 / 1116
» Randomized priority algorithms
Sort
View
CVPR
2008
IEEE
15 years 4 months ago
Photometric stereo with coherent outlier handling and confidence estimation
In photometric stereo a robust method is required to deal with outliers, such as shadows and non-Lambertian reflections. In this paper we rely on a probabilistic imaging model tha...
Frank Verbiest, Luc J. Van Gool
EDCC
2008
Springer
15 years 4 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
EUC
2008
Springer
15 years 4 months ago
Design and Analysis of a Stable Queue Control Scheme for the Internet
The recently proposed Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and ...
Naixue Xiong, Laurence Tianruo Yang, Yaoxue Zhang,...
SDM
2010
SIAM
183views Data Mining» more  SDM 2010»
15 years 3 months ago
GraSS: Graph Structure Summarization
Large graph databases are commonly collected and analyzed in numerous domains. For reasons related to either space efficiency or for privacy protection (e.g., in the case of socia...
Kristen LeFevre, Evimaria Terzi
114
Voted
SDM
2010
SIAM
195views Data Mining» more  SDM 2010»
15 years 3 months ago
Adaptive Informative Sampling for Active Learning
Many approaches to active learning involve periodically training one classifier and choosing data points with the lowest confidence. An alternative approach is to periodically cho...
Zhenyu Lu, Xindong Wu, Josh Bongard