Sciweavers

49 search results - page 10 / 10
» Exploiting Symmetry in SMT Problems
Sort
View
ECCV
2000
Springer
14 years 6 months ago
Camera Pose Estimation and Reconstruction from Image Profiles under Circular Motion
Abstract. This paper addresses the problem of motion estimation and reconstruction of 3D models from profiles of an object rotating on a turntable, obtained from a single camera. I...
Paulo R. S. Mendonça, Kwan-Yee Kenneth Wong...
COMSWARE
2006
IEEE
13 years 11 months ago
Resource management in heterogenous wireless networks with overlapping coverage
— Development in new radio technologies and increase in user demands are driving the deployment of a wide array of wireless networks, ranging from 802.11 networks in the local ar...
Bin Bin Chen, Mun Choon Chan
CSFW
1999
IEEE
13 years 9 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 4 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...