Sciweavers

598 search results - page 52 / 120
» Efficient and User-Friendly Verification
Sort
View
COMPGEOM
2004
ACM
15 years 1 months ago
Continuous path verification in multi-axis NC-machining
We introduce a new approach to the problem of collision detection between a rotating milling-cutter of an NC-machine and a model of a solid workpiece, as the rotating cutter conti...
Ron Wein, Oleg Ilushin, Gershon Elber, Dan Halperi...
PR
2010
179views more  PR 2010»
14 years 8 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar
CADE
2008
Springer
15 years 10 months ago
Certifying a Tree Automata Completion Checker
Tree automata completion is a technique for the verification of infinite state systems. It has already been used for the verification of cryptographic protocols and the prototyping...
Benoît Boyer, Thomas Genet, Thomas P. Jensen
CCS
2008
ACM
14 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ICCS
2007
Springer
15 years 1 months ago
Efficient Measurement of the Eye Blinking by Using Decision Function for Intelligent Vehicles
In this paper, we propose an efficient measurement of the eye blinking for drowsy driver detection system that is one of the driver safety systems for the intelligent vehicle. Howe...
Ilkwon Park, Jung-Ho Ahn, Hyeran Byun