Sciweavers

3025 search results - page 574 / 605
» Automatic Programming of Robots Using Genetic Programming
Sort
View
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
USENIX
1990
15 years 29 days ago
Implementation of the Ficus Replicated File System
As we approach nation-wide integration of computer systems, it is clear that le replication will play a key role, both to improve data availability in the face of failures, and to...
Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Th...
BMCBI
2008
148views more  BMCBI 2008»
14 years 12 months ago
Automating dChip: toward reproducible sharing of microarray data analysis
Background: During the past decade, many software packages have been developed for analysis and visualization of various types of microarrays. We have developed and maintained the...
Cheng Li
ECCV
2004
Springer
16 years 1 months ago
What Do Four Points in Two Calibrated Images Tell Us about the Epipoles?
Suppose that two perspective views of four world points are given, that the intrinsic parameters are known, but the camera poses and the world point positions are not. We prove tha...
David Nistér, Frederik Schaffalitzky
OOPSLA
2009
Springer
15 years 6 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and efï¬...
Damian Dechev, Bjarne Stroustrup