Sciweavers

1056 search results - page 138 / 212
» A Probabilistic Applied Pi-Calculus
Sort
View
ASIACRYPT
2009
Springer
14 years 1 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
AIME
2001
Springer
14 years 1 months ago
NasoNet, Joining Bayesian Networks and Time to Model Nasopharyngeal Cancer Spread
Abstract. Cancer spread is a non-deterministic dynamic process. As a consequence, the design of an assistant system for the diagnosis and prognosis of the extent of a cancer should...
Severino F. Galán, Francisco Aguado, Franci...
ICCV
1999
IEEE
14 years 1 months ago
Learning Low-Level Vision
We describe a learning-based method for low-level vision problems--estimating scenes from images. We generate a synthetic world of scenes and their corresponding rendered images, m...
William T. Freeman, Egon C. Pasztor
CP
1998
Springer
14 years 1 months ago
Constraints for Object Recognition in Aerial Images - Handling of Unobserved Features
In this paper we will show how constraint solving methods can be applied for the recognition of buildings in aerial images. Object models are transformed to constraint representati...
Thomas H. Kolbe
CIKM
2006
Springer
14 years 19 days ago
Topic evolution and social interactions: how authors effect research
We propose a method for discovering the dependency relationships between the topics of documents shared in social networks using the latent social interactions, attempting to answ...
Ding Zhou, Xiang Ji, Hongyuan Zha, C. Lee Giles