Sciweavers

736 search results - page 138 / 148
» Sampling of operators
Sort
View
ESOP
2008
Springer
14 years 11 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
EUSFLAT
2007
107views Fuzzy Logic» more  EUSFLAT 2007»
14 years 11 months ago
Extending the Choquet integral
In decision under uncertainty, the Choquet integral yields the expectation of a random variable with respect to a fuzzy measure (or non-additive probability or capacity). In gener...
Giovanni Rossi
MVA
2007
186views Computer Vision» more  MVA 2007»
14 years 11 months ago
License Plate Recognition from Low-Quality Videos
This paper presents a novel hybrid method for extracting license plates and recognizing characters from low-quality videos using morphological operations and Adaboost algorithm. F...
Chih-Chiang Chen, Jun-Wei Hsieh
IPCO
2004
110views Optimization» more  IPCO 2004»
14 years 11 months ago
Scheduling an Industrial Production Facility
Managing an industrial production facility requires carefully allocating limited resources, and gives rise to large, potentially complicated scheduling problems. In this paper we c...
Eyjolfur Asgeirsson, Jonathan W. Berry, Cynthia A....
WORM
2004
14 years 11 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...