Sciweavers

2070 search results - page 315 / 414
» A Reduced-Basis Element Method
Sort
View
101
Voted
FOSSACS
2009
Springer
15 years 7 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
76
Voted
ICRA
2009
IEEE
108views Robotics» more  ICRA 2009»
15 years 7 months ago
Control of hopping speed and height over unknown rough terrain using a single actuator
— We present a method for controlling the forward speed and the apex height of a one-legged hopping robot over rough terrain, using a single actuator located at the robot hip. Th...
Nicholas Cherouvim, Evangelos Papadopoulos
ICSM
2009
IEEE
15 years 7 months ago
BCC: Enhancing code completion for better API usability
Nowadays, programmers spend much of their workday dealing with code libraries and frameworks that are bloated with APIs. One common way of interacting with APIs is through Code Co...
David M. Pletcher, Daqing Hou
100
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Hyperbolic Embedding and Routing for Dynamic Graphs
—We propose an embedding and routing scheme for arbitrary network connectivity graphs, based on greedy routing and utilizing virtual node coordinates. In dynamic multihop packet-...
Andrej Cvetkovski, Mark Crovella
118
Voted
ACIVS
2009
Springer
15 years 7 months ago
Dynamic Texture Extraction and Video Denoising
According to recent works, introduced by Y.Meyer [1] the decomposition models based on Total Variation (TV) appear as a very good way to extract texture from image sequences. Indee...
Mathieu Lugiez, Michel Ménard, Abdallah El-...