Sciweavers

1599 search results - page 210 / 320
» Probabilistic Analysis of Anonymity
Sort
View
DCC
2008
IEEE
14 years 7 months ago
Improved versions of Tardos' fingerprinting scheme
We study the Tardos' probabilistic fingerprinting scheme and show that its codeword length may be shortened by a factor of approximately 4. We achieve this by retracing Tardo...
Oded Blayer, Tamir Tassa
CVPR
2008
IEEE
14 years 2 months ago
Visual quasi-periodicity
Periodicity is at the core of the recognition of many actions. This paper takes the following steps to detect and measure periodicity. 1) We establish a conceptual framework of cl...
Erik Pogalin, Arnold W. M. Smeulders, Andrew H. C....
GECCO
2007
Springer
276views Optimization» more  GECCO 2007»
14 years 2 months ago
Meta-optimizing semantic evolutionary search
I present MOSES (meta-optimizing semantic evolutionary search), a new probabilistic modeling (estimation of distribution) approach to program evolution. Distributions are not esti...
Moshe Looks
INFOCOM
2006
IEEE
14 years 2 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
QEST
2006
IEEE
14 years 2 months ago
Safe On-The-Fly Steady-State Detection for Time-Bounded Reachability
The time-bounded reachability problem for continuoustime Markov chains (CTMCs) amounts to determine the probability to reach a (set of) goal state(s) within a given time span, suc...
Joost-Pieter Katoen, Ivan S. Zapreev