Sciweavers

1833 search results - page 97 / 367
» Mechanized Verification with Sharing
Sort
View
126
Voted
MHCI
2005
Springer
15 years 6 months ago
Searching common experience: a social communication tool based on mobile ad-hoc networking
As small digital cameras become more popular, opportunities to take photos are rapidly increasing. Photo sharing is a great way to maintain and revitalize relationships between fa...
Michimune Kohno, Jun Rekimoto
ICA3PP
2007
Springer
15 years 7 months ago
RSM-Based Gossip on P2P Network
Classification is a kind of basic semantics that people often use to manage versatile contents in daily life. Resource Space Model (RSM) is a semantic model for sharing and managin...
Hai Zhuge, Xiang Li
94
Voted
ICCAD
1999
IEEE
99views Hardware» more  ICCAD 1999»
15 years 5 months ago
FunState - an internal design representation for codesign
In this paper, an internal design model called FunState (functions driven by state machines) is presented that enables the representation of different types of system components a...
Lothar Thiele, Karsten Strehl, Dirk Ziegenbein, Ro...
103
Voted
BVAI
2007
Springer
15 years 4 months ago
Recognition of Human Faces: From Biological to Artificial Vision
Face recognition is among the most challenging techniques for personal identity verification. Even though it is so natural for humans, there are still many hidden mechanisms which ...
Massimo Tistarelli, Linda Brodo, Andrea Lagorio, M...
ASM
2008
ASM
15 years 2 months ago
A Concept-Driven Construction of the Mondex Protocol Using Three Refinements
Abstract. The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical ver...
Gerhard Schellhorn, Richard Banach