Sciweavers

141 search results - page 8 / 29
» Robustness of Causal Claims
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
13 years 11 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
ICIP
2001
IEEE
14 years 9 months ago
Optimal radial contour tracking by dynamic programming
A common problem in most active contour methods is that the recursive searching scheme can only return a local optimal solution. Furthermore, the internal energy of the snake is n...
Yunqiang Chen, Thomas S. Huang, Yong Rui
TIME
1994
IEEE
13 years 11 months ago
Managing Large Temporal Delays in a Model Based Control System
: In this paper we explain how we have integrated the functionalities of a constraint management system and a temporal data base system to enable a model-based control of systems t...
Fano Ramparany
BMVC
2010
13 years 5 months ago
Robust 3D Face Recognition by Using Shape Filtering
Achieving high accuracy in the presence of expression variation remains one of the most challenging aspects of 3D face recognition. In this paper, we propose a novel recognition a...
Liang Cai, Feipeng Da