Sciweavers

217 search results - page 36 / 44
» Synthesizing Probabilistic Composers
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 8 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
CGF
2004
82views more  CGF 2004»
13 years 8 months ago
Scalable Behaviors for Crowd Simulation
Crowd simulation for virtual environments offers many challenges centered on the trade-offs between rich behavior, control and computational cost. In this paper we present a new a...
Mankyu Sung, Michael Gleicher, Stephen Chenney
CORR
2002
Springer
123views Education» more  CORR 2002»
13 years 8 months ago
Survey propagation: an algorithm for satisfiability
: We study the satisfiability of randomly generated formulas formed by M clauses of exactly K literals over N Boolean variables. For a given value of N the problem is known to be m...
Alfredo Braunstein, Marc Mézard, Riccardo Z...
MVA
2007
179views Computer Vision» more  MVA 2007»
13 years 8 months ago
Multi-object trajectory tracking
The majority of existing tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework using a Hidden Markov Model, where the distribution ...
Mei Han, Wei Xu, Hai Tao, Yihong Gong
TPDS
2010
135views more  TPDS 2010»
13 years 7 months ago
Maximizing Service Reliability in Distributed Computing Systems with Random Node Failures: Theory and Implementation
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Jorge E. Pezoa, Sagar Dhakal, Majeed M. Hayat