Sciweavers

529 search results - page 10 / 106
» The Partial Robust M-approach
Sort
View
FDTC
2008
Springer
144views Cryptology» more  FDTC 2008»
13 years 9 months ago
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems
The adaptive and active nature of fault based sidechannel attacks along with the large arsenal of fault injection methods complicates the design of effective countermeasures. To o...
Konrad J. Kulikowski, Zhen Wang, Mark G. Karpovsky
KDD
1995
ACM
216views Data Mining» more  KDD 1995»
13 years 11 months ago
Robust Decision Trees: Removing Outliers from Databases
Finding and removingoutliers is an important problem in data mining. Errors in large databases can be extremely common,so an important property of a data mining algorithm is robus...
George H. John
TITS
2008
189views more  TITS 2008»
13 years 7 months ago
Robust Road Modeling and Tracking Using Condensation
In this paper, we present a robust road detection and tracking method based on a condensation particle filter for real-time video-based navigation applications. The image is divide...
Yan Wang, Li Bai, Michael C. Fairhurst
ORL
2007
64views more  ORL 2007»
13 years 7 months ago
Robust portfolio selection with uncertain exit time using worst-case VaR strategy
In this paper we consider the robust portfolio selection problem involving two types of uncertainties; the uncertainty in the distribution of exit time and the uncertainty in the ...
Dashan Huang, Frank J. Fabozzi, Masao Fukushima
CVIU
1999
238views more  CVIU 1999»
13 years 7 months ago
A Coarse to Fine 3D Registration Method Based on Robust Fuzzy Clustering
An important problem in computer vision is to determine how features extracted from images are connected to an existing model. In this paper, we focus on solving the registration ...
Jean-Philippe Tarel, Nozha Boujemaa