Sciweavers

1845 search results - page 232 / 369
» Computing the Angularity Tolerance
Sort
View
96
Voted
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
15 years 2 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
JPDC
2008
103views more  JPDC 2008»
15 years 2 months ago
On termination detection in crash-prone distributed systems with failure detectors
We investigate the problem of detecting termination of a distributed computation in systems where processes can fail by crashing. Specifically, when the communication topology is ...
Neeraj Mittal, Felix C. Freiling, Subbarayan Venka...
ENGL
2007
108views more  ENGL 2007»
15 years 2 months ago
An Adaptive Controller for Multimodal Systems Based on Fuzzy Reference Model Generator
— This paper presents a novel adaptive controller for multimodal systems based on Fuzzy Reference Model Generator (FRMG). The proposed scheme consists of a fuzzy logic switching ...
Sukumar Kamalasadan
CAGD
2005
72views more  CAGD 2005»
15 years 2 months ago
Parametrization of approximate algebraic surfaces by lines
In this paper we present an algorithm for parametrizing approximate algebraic surfaces by lines. The algorithm is applicable to -irreducible algebraic surfaces of degree d having ...
Sonia Pérez-Díaz, Juana Sendra, J. R...
PAMI
2010
146views more  PAMI 2010»
15 years 24 days ago
A Generalized Kernel Consensus-Based Robust Estimator
In this paper, we present a new Adaptive Scale Kernel Consensus (ASKC) robust estimator as a generalization of the popular and state-of-the-art robust estimators such as RANSAC (R...
Hanzi Wang, Daniel Mirota, Gregory D. Hager