Sciweavers

5128 search results - page 108 / 1026
» When Abstraction Fails
Sort
View
CONSTRAINTS
2008
89views more  CONSTRAINTS 2008»
15 years 4 months ago
A Reinforcement Learning Approach to Interval Constraint Propagation
When solving systems of nonlinear equations with interval constraint methods, it has often been observed that many calls to contracting operators do not participate actively to th...
Frédéric Goualard, Christophe Jerman...
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 4 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
IOR
2008
96views more  IOR 2008»
15 years 4 months ago
Competition for Procurement Contracts with Service Guarantees
We consider a market with two suppliers and a set of buyers in search of procurement contracts with one of the suppliers. In particular, each buyer needs to process a certain volu...
Fernando Bernstein, Francis de Véricourt
IJCV
2006
218views more  IJCV 2006»
15 years 4 months ago
Stabilizing the Focal Length Computation for 3-D Reconstruction from Two Uncalibrated Views
In order to reconstruct 3-D shape from two uncalibrated views, one needs to resolve two problems: (i) the computed focal lengths can be imaginary; (ii) the computation fails for fi...
Ken-ichi Kanatani, Atsutada Nakatsuji, Yasuyuki Su...
JFR
2008
87views more  JFR 2008»
15 years 4 months ago
Hough based terrain classification for realtime detection of drivable ground
The usability of mobile robots for surveillance, search and rescue missions can be significantly improved by intelligent functionalities decreasing the cognitive load on the opera...
Jann Poppinga, Andreas Birk 0002, Kaustubh Pathak