Sciweavers

8655 search results - page 1400 / 1731
» Challenges for Trusted Computing
Sort
View
TCAD
2008
114views more  TCAD 2008»
15 years 3 months ago
Word-Level Predicate-Abstraction and Refinement Techniques for Verifying RTL Verilog
el Predicate Abstraction and Refinement Techniques for Verifying RTL Verilog Himanshu Jain, Daniel Kroening, Natasha Sharygina, and Edmund M. Clarke, Fellow, IEEE As a first step, ...
Himanshu Jain, Daniel Kroening, Natasha Sharygina,...
139
Voted
TCSV
2008
202views more  TCSV 2008»
15 years 3 months ago
Probabilistic Object Tracking With Dynamic Attributed Relational Feature Graph
Object tracking is one of the fundamental problems in computer vision and has received considerable attention in the past two decades. The success of a tracking algorithm relies on...
Feng Tang, Hai Tao
165
Voted
TDSC
2008
152views more  TDSC 2008»
15 years 3 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
127
Voted
TITB
2008
152views more  TITB 2008»
15 years 3 months ago
Region of Interest and Multiresolution for Volume Rendering
Medical image interpretation is facing an important challenge resulting from the continuously increasing amount of imaging data. Innovations in medical image visualization are nece...
Sébastien Piccand, Rita Noumeir, Eric Paque...
139
Voted
JCB
2007
97views more  JCB 2007»
15 years 3 months ago
Parsing Nucleic Acid Pseudoknotted Secondary Structure: Algorithm and Applications
Accurate prediction of pseudoknotted nucleic acid secondary structure is an important computational challenge. Prediction algorithms based on dynamic programming aim to find a st...
Baharak Rastegari, Anne Condon
« Prev « First page 1400 / 1731 Last » Next »