Sciweavers

6881 search results - page 1364 / 1377
» Motivation
Sort
View
IACR
2011
132views more  IACR 2011»
12 years 7 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
CORR
2012
Springer
230views Education» more  CORR 2012»
12 years 3 months ago
RT-SLAM: A Generic and Real-Time Visual SLAM Implementation
Abstract. This article presents a new open-source C++ implementation to solve the SLAM problem, which is focused on genericity, versatility and high execution speed. It is based on...
Cyril Roussillon, Aurélien Gonzalez, Joan S...
CORR
2012
Springer
170views Education» more  CORR 2012»
12 years 3 months ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
CORR
2012
Springer
204views Education» more  CORR 2012»
12 years 3 months ago
Ontologies for the Integration of Air Quality Models and 3D City Models
In the perspective of a sustainable urban planning, it is necessary to investigate cities in a holistic way and to accept surprises in the response of urban environments to a part...
Claudine Métral, Gilles Falquet, Kostas Kar...
CORR
2012
Springer
249views Education» more  CORR 2012»
12 years 3 months ago
Controlling Candidate-Sequential Elections
All previous work on “candidate-control” manipulation of elections has been in the model of full-information, simultaneous voting. This is a problem, since in quite a few real...
Edith Hemaspaandra, Lane A. Hemaspaandra, Jör...
« Prev « First page 1364 / 1377 Last » Next »