Sciweavers

773 search results - page 132 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ATVA
2011
Springer
254views Hardware» more  ATVA 2011»
12 years 9 months ago
Formal Analysis of Online Algorithms
In [AKL10], we showed how viewing online algorithms as reactive systems enables the application of ideas from formal verification to the competitive analysis of online algorithms....
Benjamin Aminof, Orna Kupferman, Robby Lampert
COMSUR
2011
203views Hardware» more  COMSUR 2011»
12 years 9 months ago
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious In
Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the netw...
Maxwell Young, Raouf Boutaba
CVPR
2012
IEEE
12 years 3 days ago
Coupling detection and data association for multiple object tracking
We present a novel framework for multiple object tracking in which the problems of object detection and data association are expressed by a single objective function. The framewor...
Zheng Wu, Ashwin Thangali, Stan Sclaroff, Margrit ...
CVPR
2010
IEEE
14 years 5 months ago
Piecewise Planar and Non-Planar Stereo for Urban Scene Reconstruction
Piecewise planar models for stereo have recently become popular for modeling indoor and urban outdoor scenes. The strong planarity assumption overcomes the challenges presented by...
David Gallup, Jan-Michael Frahm, Marc Pollefeys
ASPLOS
2006
ACM
14 years 3 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...