Sciweavers

3031 search results - page 591 / 607
» Model Driven Testing Based on Test History
Sort
View
JAR
2000
145views more  JAR 2000»
14 years 10 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
CODES
2010
IEEE
14 years 7 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...
COMPSAC
2011
IEEE
13 years 10 months ago
Palimpsests of Time and Place
— This paper discusses ongoing research into the development of an original composition portfolio themed on the concept of palimpsests of time and place. The research involves th...
Jerry Fishenden, Andrew Hugill
CVPR
2009
IEEE
3784views Computer Vision» more  CVPR 2009»
16 years 5 months ago
What is the Spatial Extent of an Object?
This paper discusses the question: Can we improve the recognition of objects by using their spatial context? We start from Bag-of-Words models and use the Pascal 2007 dataset. We u...
Arnold W. M. Smeulders, Jasper R. R. Uijlings, Rem...
ICCV
2005
IEEE
16 years 8 days ago
A Supervised Learning Framework for Generic Object Detection in Images
In recent years Kernel Principal Component Analysis (Kernel PCA) has gained much attention because of its ability to capture nonlinear image features, which are particularly impor...
Saad Ali, Mubarak Shah