Sciweavers

817 search results - page 12 / 164
» On 2-factors with k components
Sort
View
56
Voted
IFIP
1994
Springer
15 years 1 months ago
Hidden Safety Requirements in Large-Scale Systems
To avoid hidden safety problems in future large scale systems, we must be able to identify the crucial assumptions underlying the development of their components and to enunciate ...
Carl E. Landwehr
3DIM
1997
IEEE
15 years 1 months ago
3-D Modeling from Range Imagery: An Incremental Method with a Planning Component
In this article we present a method for automatically constructing a solid (in the CAD sense) model of an unknown object from range images. The model acquisition system provides f...
Michael K. Reed, Peter K. Allen, Ioannis Stamos
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 1 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
ISTA
2001
14 years 11 months ago
Supporting Behavioral Contracts for COM Components
: Specifying behavioral specifications for components apart from the conventional syntactic interface specifications can be very useful in component based system development. Preco...
Sonal Bhagat, Rushikesh K. Joshi
ICASSP
2008
IEEE
15 years 4 months ago
A pattern classification framework for theoretical analysis of component forensics
Component forensics is an emerging methodology for forensic analysis that aims at estimating the algorithms and parameters in each component of a digital device. This paper propos...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu