Sciweavers

537 search results - page 73 / 108
» On Using Monte Carlo Methods for Scheduling
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 11 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
CAV
2004
Springer
202views Hardware» more  CAV 2004»
14 years 1 months ago
Statistical Model Checking of Black-Box Probabilistic Systems
Abstract. We propose a new statistical approach to analyzing stochastic systems against specifications given in a sublogic of continuous stochastic logic (CSL). Unlike past numeri...
Koushik Sen, Mahesh Viswanathan, Gul Agha
ICRA
2002
IEEE
100views Robotics» more  ICRA 2002»
14 years 17 days ago
Preliminary Results in Range-Only Localization and Mapping
This paper presents methods of localization using cooperating landmarks (beacons) that provide the ability to measure range only. Recent advances in radio frequency technology mak...
George Kantor, Sanjiv Singh
ICPR
2010
IEEE
13 years 11 months ago
The Fusion of Deep Learning Architectures and Particle Filtering Applied to Lip Tracking
This work introduces a new pattern recognition model for segmenting and tracking lip contours in video sequences. We formulate the problem as a general nonrigid object tracking me...
Gustavo Carneiro, Jacinto Nascimento
NOMS
2008
IEEE
14 years 2 months ago
A novel approach to bottleneck analysis in networks
—In this paper∗ , we devise a novel method for bottleneck analysis of UDP networks based on the concept of network utility maximization. To determine the losses on the links in...
Nikhil Shetty, Assane Gueye, Jean C. Walrand