Sciweavers

1291 search results - page 50 / 259
» Computing the multiplicity structure in solving polynomial s...
Sort
View
P2P
2009
IEEE
112views Communications» more  P2P 2009»
14 years 2 months ago
SyMon: Defending large structured P2P systems against Sybil Attack
Sybil attack is one of the most challenging problems that plague current decentralized Peer-to-Peer systems. In Sybil attack, a single malicious user creates multiple peer identit...
B. S. Jyothi, D. Janakiram
CAMP
2005
IEEE
13 years 9 months ago
An Open System for 3D Data Acquisition from Multiple Sensor
Abstract— This paper describes a work in progress on a multisensor system for 3D data acquisition. The system core structure is a 3D-range scan based on the well known active tri...
Francesco Isgrò, Francesca Odone, Alessandr...
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
13 years 11 months ago
Computing the Algebraic Immunity Efficiently
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very eff...
Frédéric Didier, Jean-Pierre Tillich
3DPVT
2006
IEEE
236views Visualization» more  3DPVT 2006»
14 years 1 months ago
Multiple Camera Calibration Using Robust Perspective Factorization
In this paper we address the problem of recovering structure and motion from a large number of intrinsically calibrated perspective cameras. We describe a method that combines (1)...
Andrei Zaharescu, Radu Horaud, Rémi Ronfard...
AI
2007
Springer
13 years 7 months ago
Computational properties of argument systems satisfying graph-theoretic constraints
One difficulty that arises in abstract argument systems is that many natural questions regarding argument acceptability are, in general, computationally intractable having been c...
Paul E. Dunne