Sciweavers

773 search results - page 119 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
EUROMICRO
2007
IEEE
15 years 5 months ago
Guiding Component-Based Hardware/Software Co-Verification with Patterns
In component-based hardware/software co-verification, properties of an embedded system are established from properties of its hardware and software components. A major challenge i...
Juncao Li, Fei Xie, Huaiyu Liu
FSEN
2009
Springer
15 years 5 months ago
Executable Interface Specifications for Testing Asynchronous Creol Components
We propose and explore a formal approach for black-box testing asynchronously communicating components in open environments. Asynchronicity poses a challenge for validating and tes...
Immo Grabe, Marcel Kyas, Martin Steffen, Arild B. ...
GLOBECOM
2009
IEEE
15 years 5 months ago
Optimization of Energy Efficient Transmission in Underwater Sensor Networks
Underwater communication is a challenging topic due to its singular channel characteristics. Most protocols used in terrestrial wireless communication can not be directly applied i...
Hongkun Yang, Bin Liu, Fengyuan Ren, Hao Wen, Chua...
3DPVT
2004
IEEE
166views Visualization» more  3DPVT 2004»
15 years 5 months ago
Multi-Camera Reconstruction based on Surface Normal Estimation and Best Viewpoint Selection
In this paper, we present a new algorithm for reconstructing an environment from images recorded by multiple calibrated cameras. Multiple camera systems challenge traditional ster...
Xenophon Zabulis, Kostas Daniilidis
AMAST
2006
Springer
15 years 5 months ago
State Space Reduction of Rewrite Theories Using Invisible Transitions
Abstract. State space explosion is the hardest challenge to the effective application of model checking methods. We present a new technique for achieving drastic state space reduct...
Azadeh Farzan, José Meseguer