Sciweavers

666 search results - page 113 / 134
» Inspector Methods for State Abstraction
Sort
View
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 2 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
62
Voted
DSVIS
2003
Springer
15 years 2 months ago
Functionally Modeled User Interfaces
Modern industrial-strength user interface toolkits are usually described informally, in terms of implementation artifacts such as objects and imperative state. While the practical...
Antony Courtney
ECCV
2010
Springer
15 years 2 months ago
Compressive Acquisition of Dynamic Scenes
Abstract. Compressive sensing (CS) is a new approach for the acquisition and recovery of sparse signals and images that enables sampling rates significantly below the classical Ny...
ECCV
2010
Springer
15 years 2 months ago
Weakly Supervised Shape Based Object Detection with Particle Filter
Abstract. We describe an efficient approach to construct shape models composed of contour parts with partially-supervised learning. The proposed approach can easily transfer parts ...
89
Voted
IWCMC
2009
ACM
15 years 2 months ago
Cross-layer resource allocation scheme for multi-band high rate UWB systems
Abstract- In this paper, we investigate the use of a crosslayer allocation mechanism for the high-rate ultra-wideband (UWB) systems. The aim of this paper is twofold. First, throug...
Ayman Khalil, Matthieu Crussière, Jean-Fran...