Sciweavers

3015 search results - page 103 / 603
» The robustness of a new CAPTCHA
Sort
View
AAAI
2012
12 years 15 days ago
Robust Cuts Over Time: Combatting the Spread of Invasive Species with Unreliable Biological Control
Widespread accounts of the harmful effects of invasive species have stimulated both practical and theoretical studies on how the spread of these destructive agents can be containe...
Gwen Spencer
CVPR
2005
IEEE
15 years 4 days ago
The Modified pbM-Estimator Method and a Runtime Analysis Technique for the RANSAC Family
Robust regression techniques are used today in many computer vision algorithms. Chen and Meer recently presented a new robust regression technique named the projection based M-est...
Stas Rozenfeld, Ilan Shimshoni
INFOCOM
2006
IEEE
14 years 4 months ago
Design and Evaluation of a Fast and Robust Worm Detection Algorithm
— Fast spreading worms are a reality, as amply demonstrated by worms such as Slammer, which reached its peak propagation in a matter of minutes. With these kinds of fast spreadin...
Tian Bu, Aiyou Chen, Scott A. Vander Wiel, Thomas ...
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
14 years 3 months ago
An error-correcting unordered code and hardware support for robust asynchronous global communication
A new delay-insensitive data encoding scheme for global asynchronous communication is introduced. The goal of this work is to combine the timing-robustness of delay-insensitive (i....
Melinda Y. Agyekum, Steven M. Nowick
FC
2010
Springer
205views Cryptology» more  FC 2010»
14 years 2 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao