Sciweavers

5675 search results - page 53 / 1135
» Exploiting Chaos for Computation
Sort
View
SPW
2005
Springer
14 years 4 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
ECCV
2010
Springer
14 years 4 months ago
Exploiting loops in the graph of trifocal tensors for calibrating a network of cameras
A technique for calibrating a network of perspective cameras based on their graph of trifocal tensors is presented. After estimating a set of reliable epipolar geometries, a parame...
EUROPAR
1998
Springer
14 years 3 months ago
Exploiting Atomic Broadcast in Replicated Databases
Database replication protocols have historically been built on top of distributed database systems, and have consequently been designed and implemented using distributed transacti...
Fernando Pedone, Rachid Guerraoui, André Sc...
AI
2006
Springer
14 years 2 months ago
Exploiting Dynamic Independence in a Static Conditioning Graph
Abstract. A conditioning graph (CG) is a graphical structure that attempt to minimize the implementation overhead of computing probabilities in belief networks. A conditioning grap...
Kevin Grant, Michael C. Horsch
FTDCS
2004
IEEE
14 years 2 months ago
Exploiting Semantic Proximity in Peer-to-Peer Content Searching
A lot of recent work has dealt with improving performance of content searching in peer-to-peer file sharing systems. In this paper we attack this problem by modifying the overlay ...
Spyros Voulgaris, Anne-Marie Kermarrec, Laurent Ma...