Sciweavers

3116 search results - page 254 / 624
» Recovering
Sort
View
98
Voted
AUTOMATICA
2006
118views more  AUTOMATICA 2006»
15 years 26 days ago
Diagonal stability of a class of cyclic systems and its connection with the secant criterion
We consider a class of systems with a cyclic interconnection structure that arises, among other examples, in dynamic models for certain biochemical reactions. We first show that a...
Murat Arcak, Eduardo D. Sontag
78
Voted
CVGIP
2006
96views more  CVGIP 2006»
15 years 25 days ago
Video motion analysis for the synthesis of dynamic cues and Futurist art
This paper presents new methods for stylising video to produce cartoon motion emphasis cues and modern art. Specifically, we introduce "dynamic cues" as a class of motio...
John P. Collomosse, Peter M. Hall
80
Voted
DSS
2006
75views more  DSS 2006»
15 years 25 days ago
Model alignment of anthrax attack simulations
This paper describes our experience aligning two simulation models of disease progression after biological attacks. The first model is the Incubation-Prodromal-Fulminant (IPF) mod...
Li-Chiou Chen, Kathleen M. Carley, Douglas B. Frid...
IJACT
2008
101views more  IJACT 2008»
15 years 25 days ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
108
Voted
IJISEC
2008
92views more  IJISEC 2008»
15 years 25 days ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk