Sciweavers

2827 search results - page 358 / 566
» Robustness of PSPACE-complete sets
Sort
View
ACCV
2007
Springer
15 years 10 months ago
Object Detection Combining Recognition and Segmentation
Abstract. We develop an object detection method combining top-down recognition with bottom-up image segmentation. There are two main steps in this method: a hypothesis generation s...
Liming Wang, Jianbo Shi, Gang Song, I-fan Shen
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 10 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
ADHOCNOW
2007
Springer
15 years 10 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf
COLT
2007
Springer
15 years 10 months ago
Prediction by Categorical Features: Generalization Properties and Application to Feature Ranking
We describe and analyze a new approach for feature ranking in the presence of categorical features with a large number of possible values. It is shown that popular ranking criteria...
Sivan Sabato, Shai Shalev-Shwartz
131
Voted
NETCOOP
2007
Springer
15 years 10 months ago
A Network Formation Game Approach to Study BitTorrent Tit-for-Tat
The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-T...
Giovanni Neglia, Giuseppe Lo Presti, Honggang Zhan...