Sciweavers

116 search results - page 13 / 24
» views 1996
Sort
View
WISTP
2009
Springer
14 years 2 months ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...
ICML
2001
IEEE
14 years 8 months ago
Off-Policy Temporal Difference Learning with Function Approximation
We introduce the first algorithm for off-policy temporal-difference learning that is stable with linear function approximation. Off-policy learning is of interest because it forms...
Doina Precup, Richard S. Sutton, Sanjoy Dasgupta
OSDI
1996
ACM
13 years 9 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
CVPR
1996
IEEE
14 years 9 months ago
A Factorization Method for Affine Structure from Line Correspondences
A family of structure from motion algorithms called the factorization method has been recently developed from the orthographic projection model to the afJine camera model [23, i6,...
Long Quan, Takeo Kanade
CVPR
1996
IEEE
14 years 9 months ago
Comparison of Approaches to Egomotion Computation
We evaluated six algorithms for computing egomotion from image velocities. We established benchmarks for quantifying bias and sensitivity to noise, and for quantifying the converg...
Tina Yu Tian, Carlo Tomasi, David J. Heeger