Sciweavers

2250 search results - page 418 / 450
» Authorizing applications in singularity
Sort
View
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
15 years 1 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
ICCV
1995
IEEE
15 years 1 months ago
Bayesian Decision Theory, the Maximum Local Mass Estimate, and Color Constancy
Computational vision algorithms are often developed in a Bayesian framework. Two estimators are commonly used: maximum a posteriori (MAP), and minimum mean squared error (MMSE). W...
William T. Freeman, David H. Brainard
ICDAR
1995
IEEE
15 years 1 months ago
Semi-automatic delineation of regions in floor plans
We propose a technique that makes use of a proximity metric for delineating partially or fully bounded regions of a scanned bitmap that depicts a building floor plan. A proximity...
Kathy Ryall, Stuart M. Shieber, Joe Marks, Murray ...
BIRTHDAY
1991
Springer
15 years 1 months ago
The Markgraf Karl Refutation Procedure
The goal of the MKRP project is the development of a theorem prover which can be used as an inference engine in various applications, in particular it should be capable of proving ...
Hans Jürgen Ohlbach, Jörg H. Siekmann
GLOBECOM
2009
IEEE
15 years 29 days ago
A New Coupling Channel Estimator for Cross-Talk Cancellation at Wireless Relay Stations
In this paper, we are concerned with cross-talk interference from the transmit to the receive antenna of a wireless channel-reuse-relay-station (CRRS) that forwards signals over t...
Jun Ma, Ye (Geoffrey) Li, Jinyun Zhang, Toshiyuki ...