Sciweavers

501 search results - page 61 / 101
» Diagram Techniques for Confluence
Sort
View
FMSD
2000
86views more  FMSD 2000»
15 years 1 months ago
Verifying Temporal Properties of Reactive Systems: A STeP Tutorial
We review a number of formal verification techniques supported by STeP, the Stanford Temporal Prover, describing how the tool can be used to verify properties of several versions o...
Nikolaj Bjørner, Anca Browne, Michael Col&o...
TVCG
2011
121views more  TVCG 2011»
14 years 9 months ago
GPU-Assisted Computation of Centroidal Voronoi Tessellation
—Centroidal Voronoi tessellations (CVT) are widely used in computational science and engineering. The most commonly used method is Lloyd’s method, and recently the L-BFGS metho...
Guodong Rong, Yang Liu, Wenping Wang, Xiaotian Yin...
APN
2008
Springer
15 years 4 months ago
MC-SOG: An LTL Model Checker Based on Symbolic Observation Graphs
Model checking is a powerful and widespread technique for the verification of finite distributed systems. However, the main hindrance for wider application of this technique is the...
Kais Klai, Denis Poitrenaud
DAGSTUHL
2010
15 years 3 months ago
Patient-Specific Mappings between Myocardial and Coronary Anatomy
The segmentation of the myocardium based on the 17-segment model as recommended by the American Heart Association is widely used in medical practice. The patient-specific coronary...
Maurice Termeer, Javier Oliván Bescó...
SIBGRAPI
2007
IEEE
15 years 8 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer