Sciweavers

2721 search results - page 420 / 545
» An experimental analysis of Lemke-Howson algorithm
Sort
View
DATE
2008
IEEE
113views Hardware» more  DATE 2008»
15 years 11 months ago
Random Stimulus Generation using Entropy and XOR Constraints
Despite the growing research effort in formal verification, constraint-based random simulation remains an integral part of design validation, especially for large design componen...
Stephen Plaza, Igor L. Markov, Valeria Bertacco
FGR
2008
IEEE
184views Biometrics» more  FGR 2008»
15 years 11 months ago
Multi-attribute robust facial feature localization
In this paper, we focus on the reliable detection of facial fiducial points, such as eye, eyebrow and mouth corners. The proposed algorithm aims to improve automatic landmarking ...
Oya Çeliktutan, Hatice Cinar Akakin, Bü...
GLOBECOM
2008
IEEE
15 years 11 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
ICASSP
2008
IEEE
15 years 11 months ago
Hierarchical lane detection for different types of roads
This paper presents a hierarchical lane detection system with the ability to deal with both structured and unstructured roads. The proposed system classifies the environment first...
Hsu-Yung Cheng, Chih-Chang Yu, Chien-Cheng Tseng, ...
IEEEARES
2008
IEEE
15 years 11 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto