Sciweavers

4007 search results - page 291 / 802
» Computation with imprecise probabilities
Sort
View
SP
2003
IEEE
15 years 10 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
ECCV
2010
Springer
15 years 9 months ago
We Are Family: Joint Pose Estimation of Multiple Persons
We present a novel multi-person pose estimation framework, which extends pictorial structures (PS) to explicitly model interactions between people and to estimate their poses joint...
CRYPTO
2001
Springer
147views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Correlation Analysis of the Shrinking Generator
Abstract. The shrinking generator is a well-known keystream generator composed of two linear feedback shift registers, LFSR1 and LFSR2, where LFSR1 is clock-controlled according to...
Jovan Dj. Golic
ICNP
2000
IEEE
15 years 9 months ago
An Analysis of Packet Loss Correlation in FEC-Enhanced Multicast Trees
We study group loss probabilities of Forward Error Correction (FEC) codes in shared loss multicast communication. We present a new analysis model with explicit state equations usi...
Marc Mosko, J. J. Garcia-Luna-Aceves
ISPAN
1999
IEEE
15 years 9 months ago
Sparse Networks Tolerating Random Faults
A network G is called random-fault-tolerant (RFT) network for a network G if G contains a fault-free isomorphic copy of G with high probability even if each processor fails indepe...
Toshinori Yamada, Shuichi Ueno