Sciweavers

1797 search results - page 297 / 360
» Regularized Winnow Methods
Sort
View
ICRA
2007
IEEE
168views Robotics» more  ICRA 2007»
14 years 3 months ago
A New Approach for Active Stereo Camera Calibration
— By active stereo we mean a stereo vision system that allows for independent panning and tilting for each of the two cameras. One advantage of active stereo in relation to regul...
Hyukseong Kwon, Johnny Park, Avinash C. Kak
INFOCOM
2007
IEEE
14 years 3 months ago
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
— High-speed backbones are regularly affected by various kinds of network anomalies, ranging from malicious attacks to harmless large data transfers. Different types of anomalies...
Tarem Ahmed, Mark Coates, Anukool Lakhina
ASIACRYPT
2007
Springer
14 years 3 months ago
How to Build a Hash Function from Any Collision-Resistant Function
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Thomas Ristenpart, Thomas Shrimpton
CASC
2007
Springer
108views Mathematics» more  CASC 2007»
14 years 3 months ago
Comprehensive Triangular Decomposition
We introduce the concept of comprehensive triangular decomposition (CTD) for a parametric polynomial system F with coefficients in a field. In broad words, this is a finite part...
Changbo Chen, Oleg Golubitsky, François Lem...
HPCC
2007
Springer
14 years 3 months ago
On Pancyclicity Properties of OTIS Networks
The OTIS-Network (also referred to as two-level swapped network) is composed of n clones of an n-node original network constituting its clusters. It has received much attention due...
Mohammad R. Hoseinyfarahabady, Hamid Sarbazi-Azad