Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Interest point detectors are the starting point in image analysis for depth estimation using epipolar geometry and camera ego-motion estimation. With several detectors defined in ...
Sreenivas R. Sukumar, David L. Page, Hamparsum Boz...
This paper presents an enhanced hypothesis verification strategy for 3D object recognition. A new learning methodology is presented which integrates the traditional dichotomic obj...
James M. Ferryman, Anthony D. Worrall, Stephen J. ...
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Different approaches have been developed to mitigate the state space explosion of model checking techniques. Among them, symbolic verification techniques use efficient representati...