Sciweavers

1474 search results - page 146 / 295
» Exploiting Locality in a TMS
Sort
View
CSCLP
2004
Springer
15 years 8 months ago
Constraint-Based Approaches to the Covering Test Problem
Covering arrays have been studied for their applications to drug screening and software and hardware testing. In this paper, we model the problem as a constraint program. Our propo...
Brahim Hnich, Steven David Prestwich, Evgeny Selen...
EUROPAR
2004
Springer
15 years 8 months ago
A Small World Overlay Network for Resource Discovery
Abstract. Interest is rising in genuinely distributed ('peer-to-peer') resource discovery systems, which all provide mechanisms for self-organization of their resource pr...
Koen Vanthournout, Geert Deconinck, Ronnie Belmans
167
Voted
FGR
2004
IEEE
220views Biometrics» more  FGR 2004»
15 years 8 months ago
Integration of 2D and 3D Images for Enhanced Face Authentication
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
15 years 8 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...
165
Voted
APN
2000
Springer
15 years 8 months ago
Efficient Symbolic State-Space Construction for Asynchronous Systems
Many techniques for the verification of reactive systems rely on the analysis of their reachable state spaces. In this paper, a new algorithm for the symbolic generation of the sta...
Gianfranco Ciardo, Gerald Lüttgen, Radu Simin...