Sciweavers

2658 search results - page 219 / 532
» On efficient balanced codes
Sort
View
CVPR
2007
IEEE
16 years 6 months ago
Fast Keypoint Recognition in Ten Lines of Code
While feature point recognition is a key component of modern approaches to object detection, existing approaches require computationally expensive patch preprocessing to handle pe...
Mustafa Özuysal, Pascal Fua, Vincent Lepetit
ASPLOS
2009
ACM
16 years 5 months ago
Optimization of tele-immersion codes
As computational power increases, tele-immersive applications are an emerging trend. These applications make extensive demands on computational resources through their heavy use o...
Albert Sidelnik, I-Jui Sung, Wanmin Wu, Marí...
ICSE
2004
IEEE-ACM
16 years 4 months ago
Assume-Guarantee Verification of Source Code with Design-Level Assumptions
Model checking is an automated technique that can be used to determine whether a system satisfies certain required properties. To address the "state explosion" problem a...
Dimitra Giannakopoulou, Corina S. Pasareanu, Jamie...
ECOWS
2004
Springer
15 years 10 months ago
Managers Don't Code: Making Web Services Middleware Applicable for End-Users
Today’s web-pages are primarily designed for occasional usage. Professional users therefore use special applications that use Web Services increasingly. As the number of internet...
Alexander Hilliger von Thile, Ingo Melzer, Hans-Pe...
131
Voted
ESORICS
2010
Springer
15 years 5 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik