Sciweavers

3116 search results - page 87 / 624
» Recovering
Sort
View
ICPR
2004
IEEE
14 years 9 months ago
Extending Dynamic Range of Two Color Images under Different Exposures
We present a method of extending the dynamic range of an picture with two different exposure images. Since pictures under different exposure times show different scene dynamic ran...
Ki-Sang Hong, Won-ho Cho
ICML
2004
IEEE
14 years 8 months ago
Apprenticeship learning via inverse reinforcement learning
We consider learning in a Markov decision process where we are not explicitly given a reward function, but where instead we can observe an expert demonstrating the task that we wa...
Pieter Abbeel, Andrew Y. Ng
CHES
2009
Springer
141views Cryptology» more  CHES 2009»
14 years 8 months ago
Fault Attacks on RSA Signatures with Partially Unknown Messages
Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90's, Boneh, DeMillo and Lipton [6] introduced fault-based attacks...
Jean-Sébastien Coron, Antoine Joux, Ilya Ki...
KDD
2002
ACM
128views Data Mining» more  KDD 2002»
14 years 8 months ago
Privacy preserving mining of association rules
We present a framework for mining association rules from transactions consisting of categorical items where the data has been randomized to preserve privacy of individual transact...
Alexandre V. Evfimievski, Ramakrishnan Srikant, Ra...
OSDI
2004
ACM
14 years 8 months ago
Microreboot - A Technique for Cheap Recovery
A significant fraction of software failures in large-scale Internet systems are cured by rebooting, even when the exact failure causes are unknown. However, rebooting can be expen...
George Candea, Shinichi Kawamoto, Yuichi Fujiki, G...