Sciweavers

195 search results - page 27 / 39
» The incomplete fixation measure
Sort
View
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
14 years 1 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart
KIVS
2005
Springer
14 years 1 months ago
An Integrated Simulator for Inter-Domain Scenarios
Abstract. The simulation of large-scale inter-domain networks is useful for various aspects of network planning and management. It is also a challenge due to its scalability proble...
Matthias Scheidegger, Florian Baumgartner, Torsten...
ECCV
2004
Springer
14 years 1 months ago
A Probabilistic Approach to Large Displacement Optical Flow and Occlusion Detection
This paper deals with the computation of optical flow and occlusion detection in the case of large displacements. We propose a Bayesian approach to the optical flow problem and s...
Christoph Strecha, Rik Fransens, Luc J. Van Gool
ESORICS
2004
Springer
14 years 1 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
ICT
2004
Springer
120views Communications» more  ICT 2004»
14 years 1 months ago
Scalable End-to-End Multicast Tree Fault Isolation
We present a novel protocol, M3L, for multicast tree fault isolation based purely upon end-to-end information. Here, a fault is a link with a loss rate exceeding a specified thres...
Timur Friedman, Donald F. Towsley, James F. Kurose