Sciweavers

784 search results - page 110 / 157
» An underlying model for defeat mechanisms
Sort
View
IJCV
1998
238views more  IJCV 1998»
13 years 8 months ago
Feature Detection with Automatic Scale Selection
The fact that objects in the world appear in different ways depending on the scale of observation has important implications if one aims at describing them. It shows that the not...
Tony Lindeberg
ISW
2004
Springer
14 years 1 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
DKE
2007
130views more  DKE 2007»
13 years 8 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
AAAI
2011
12 years 8 months ago
On Expressing Value Externalities in Position Auctions
Externalities are recognized to exist in the sponsored search market, where two co-located ads compete for user attention. Existing work focuses on the effect of another ad on th...
Florin Constantin, Malvika Rao, Chien-Chung Huang,...
ALIFE
2006
13 years 8 months ago
Genetic Stability and Territorial Structure Facilitate the Evolution of Tag-Mediated Altruism
Evolutionary theorists have long been interested in the conditions that permit the evolution of altruistic cooperation. Recent work has demonstrated that altruistic donation can ev...
Lee Spector, Jon Klein