Sciweavers

100 search results - page 7 / 20
» New constructions of weak epsilon-nets
Sort
View
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 8 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
ICCV
2009
IEEE
13 years 7 months ago
A robust boosting tracker with minimum error bound in a co-training framework
The varying object appearance and unlabeled data from new frames are always the challenging problem in object tracking. Recently machine learning methods are widely applied to tra...
Rong Liu, Jian Cheng, Hanqing Lu
ACS
2004
13 years 9 months ago
Categorical and Combinatorial Aspects of Descent Theory
There is a construction which lies at the heart of descent theory. The combinatorial aspects of this paper concern the description of the construction in all dimensions. The descr...
Ross Street
CALCO
2009
Springer
150views Mathematics» more  CALCO 2009»
14 years 4 months ago
Approximating Labelled Markov Processes Again!
Abstract. Labelled Markov processes are continuous-state fully probabilistic labelled transition systems. They can be seen as co-algebras of a suitable monad on the category of mea...
Philippe Chaput, Vincent Danos, Prakash Panangaden...
CAV
1999
Springer
92views Hardware» more  CAV 1999»
14 years 2 months ago
Latency Insensitive Protocols
The theory of latency insensitive design is presented as the foundation of a new correct by construction methodology to design very large digital systems by assembling blocks of In...
Luca P. Carloni, Kenneth L. McMillan, Alberto L. S...