Sciweavers

9 search results - page 1 / 2
» SAL 2
Sort
View
CAV
2004
Springer
123views Hardware» more  CAV 2004»
13 years 10 months ago
SAL 2
SAL 2 augments the specification language and explicit-state model checker of SAL 1 with high-performance symbolic and bounded model checkers, and with novel infinite bounded and...
Leonardo Mendonça de Moura, Sam Owre, Haral...
TMM
2011
166views more  TMM 2011»
12 years 12 months ago
Audiovisual Discrimination Between Speech and Laughter: Why and When Visual Information Might Help
Past research on automatic laughter classification / detection has focused mainly on audio-based approaches. Here we present an audiovisual approach to distinguishing laughter fr...
Stavros Petridis, Maja Pantic
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
13 years 10 months ago
Introducing a watermarking with a multi-objective genetic algorithm
We propose an evolutionary algorithm for the enhancement of digital semi-fragile watermaking based on the manipulation of the image discrete cosine transform (DCT). The algorithm ...
Diego Sal Díaz, Manuel Grana Romay
FC
2010
Springer
260views Cryptology» more  FC 2010»
13 years 6 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
CORR
2011
Springer
146views Education» more  CORR 2011»
13 years 1 days ago
Refined bounds on the number of connected components of sign conditions on a variety
Let R be a real closed field, P, Q ⊂ R[X1, . . . , Xk] finite subsets of polynomials, with the degrees of the polynomials in P (resp. Q) bounded by d (resp. d0). Let V ⊂ Rk b...
Sal Barone, Saugata Basu