Sciweavers

3918 search results - page 590 / 784
» Probabilistic model of triangulation
Sort
View
SP
2009
IEEE
15 years 10 months ago
Exploiting Unix File-System Races via Algorithmic Complexity Attacks
We defeat two proposed Unix file-system race condition defense mechanisms. First, we attack the probabilistic defense mechanism of Tsafrir, et al., published at USENIX FAST 2008[...
Xiang Cai, Yuwei Gui, Rob Johnson
ICDM
2009
IEEE
163views Data Mining» more  ICDM 2009»
15 years 10 months ago
Kernel Conditional Quantile Estimation via Reduction Revisited
Quantile regression refers to the process of estimating the quantiles of a conditional distribution and has many important applications within econometrics and data mining, among ...
Novi Quadrianto, Kristian Kersting, Mark D. Reid, ...
CONCUR
2009
Springer
15 years 10 months ago
Weighted Bisimulation in Linear Algebraic Form
Abstract. We study bisimulation and minimization for weighted automata, relying on a geometrical representation of the model, linear weighted automata (lwa). In a lwa, the state-sp...
Michele Boreale
140
Voted
ICVS
2009
Springer
15 years 10 months ago
A Multiple Hypothesis Approach for a Ball Tracking System
This paper presents a computer vision system for tracking and predicting flying balls in 3-D from a stereo-camera. It pursues a “textbook-style” approach with a robust circle ...
Oliver Birbach, Udo Frese
ISMIS
2009
Springer
15 years 10 months ago
A General Framework for Revising Belief Bases Using Qualitative Jeffrey's Rule
Intelligent agents require methods to revise their epistemic state as they acquire new information. Jeffrey’s rule, which extends conditioning to uncertain inputs, is used to re...
Salem Benferhat, Didier Dubois, Henri Prade, Mary-...