Sciweavers

1690 search results - page 245 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
117
Voted
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
126
Voted
SIGSOFT
2006
ACM
15 years 9 months ago
Interpolation for data structures
Interpolation based automatic abstraction is a powerful and robust technique for the automated analysis of hardware and software systems. Its use has however been limited to contr...
Deepak Kapur, Rupak Majumdar, Calogero G. Zarba
143
Voted
CCGRID
2005
IEEE
15 years 9 months ago
A distributed resource and network partitioning architecture for service grids
Abstract In this paper, we propose the use of a distributed service management architecture for state-of-the-art service-enabled Grids. The architecture is capable of performing au...
Bruno Volckaert, Pieter Thysebaert, Marc De Leenhe...
ICRA
2005
IEEE
150views Robotics» more  ICRA 2005»
15 years 9 months ago
Complex Task Allocation For Multiple Robots
Abstract— Recent research trends and technology developments are bringing us closer to the realization of autonomous multirobot systems performing increasingly complex missions. ...
Robert Zlot, Anthony Stentz
122
Voted
VISUALIZATION
2005
IEEE
15 years 9 months ago
Visualizing the tightening of knots
The study of physical models for knots has recently received much interest in the mathematics community. In this paper, we consider the ropelength model, which considers knots tie...
Jason Cantarella, Michael Piatek, Eric Rawdon