Sciweavers

2088 search results - page 257 / 418
» The Probabilistic Method
Sort
View
SP
2009
IEEE
15 years 10 months ago
Exploiting Unix File-System Races via Algorithmic Complexity Attacks
We defeat two proposed Unix file-system race condition defense mechanisms. First, we attack the probabilistic defense mechanism of Tsafrir, et al., published at USENIX FAST 2008[...
Xiang Cai, Yuwei Gui, Rob Johnson
131
Voted
ICDM
2009
IEEE
163views Data Mining» more  ICDM 2009»
15 years 10 months ago
Kernel Conditional Quantile Estimation via Reduction Revisited
Quantile regression refers to the process of estimating the quantiles of a conditional distribution and has many important applications within econometrics and data mining, among ...
Novi Quadrianto, Kristian Kersting, Mark D. Reid, ...
ICRA
2009
IEEE
163views Robotics» more  ICRA 2009»
15 years 9 months ago
3D tree reconstruction from laser range data
— We present a method for reconstructing 3D models of tree branch structure from laser range data. Our approach is probabilistic, and uses a generative model of a tree to guide a...
Jonathan Binney, Gaurav S. Sukhatme
IROS
2009
IEEE
147views Robotics» more  IROS 2009»
15 years 9 months ago
A multi-hypothesis topological SLAM approach for loop closing on edge-ordered graphs
— We present a method for topological SLAM that specifically targets loop closing for edge-ordered graphs. Instead of using a heuristic approach to accept or reject loop closing...
Stephen Tully, George Kantor, Howie Choset, Felix ...
ISMIS
2009
Springer
15 years 9 months ago
A General Framework for Revising Belief Bases Using Qualitative Jeffrey's Rule
Intelligent agents require methods to revise their epistemic state as they acquire new information. Jeffrey’s rule, which extends conditioning to uncertain inputs, is used to re...
Salem Benferhat, Didier Dubois, Henri Prade, Mary-...