Sciweavers

1594 search results - page 167 / 319
» An Algorithm to Compute Collusion Paths
Sort
View
137
Voted
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 7 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
ICRA
2009
IEEE
164views Robotics» more  ICRA 2009»
15 years 10 months ago
Assigning cameras to subjects in video surveillance systems
— We consider the problem of tracking multiple agents moving amongst obstacles, using multiple cameras. Given an environment with obstacles, and many people moving through it, we...
Hazem El-Alfy, David Jacobs, Larry Davis
144
Voted
CA
2003
IEEE
15 years 8 months ago
Inserting Synthetic Characters into Live-Action Scenes of Multiple People
— Using a single camera, we capture video of multiple people walking in an open area and insert a moving synthetic character into the scene. The people are located in the video u...
Arunachalam Somasundaram, Rick Paren
117
Voted
CAD
2006
Springer
15 years 3 months ago
Internal architecture design and freeform fabrication of tissue replacement structures
Modeling, design and fabrication of tissue scaffolds with intricate architecture, porosity and pore size for desired tissue properties presents a challenge in tissue engineering. ...
Binil Starly, Wing Lau, Tom Bradbury, Wei Sun
160
Voted
IWCMC
2010
ACM
15 years 1 months ago
High performance modified DSR routing protocol for WLAN mesh networks
This work presents a cross-layer modification to the DSR protocol which discovers high throughput paths on multi-hop wireless mesh networks. The modified DSR incorporates a metric...
Mustafa Ramadhan, Mark Davis