Sciweavers

1054 search results - page 44 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
106
Voted
CBSE
2004
Springer
15 years 7 months ago
Correctness of Component-Based Adaptation
Abstract. Long running applications often need to adapt due to changing requirements or changing environment. Typically, such adaptation is performed by dynamically adding or remov...
Sandeep S. Kulkarni, Karun N. Biyani
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
15 years 4 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
115
Voted
STTT
2008
134views more  STTT 2008»
15 years 1 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
ICPR
2000
IEEE
16 years 3 months ago
Creating Virtual Walkthrough Environment from Vertical Panoramic Mosaic
In this paper, a novel algorithm for creating virtual indoor environments is described. First, a panoramic mosaic is generated from a series of photos taken with a camera rotates ...
Tze-kin Lao, Kin-hong Wong, Kam-sum Lee, Siu-Hang ...
ICIP
2009
IEEE
14 years 11 months ago
A high-resolution image reconstuction method from low-resolution image sequence
This paper presents a high-resolution image reconstruction method from low-resolution image sequence. It is difficult to recognize details from a low-resolution image because of s...
Yeol-Min Seong, HyunWook Park