Sciweavers

988 search results - page 86 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ICCAD
1998
IEEE
66views Hardware» more  ICCAD 1998»
15 years 2 months ago
Tight integration of combinational verification methods
Combinational verification is an important piece of most equivalence checking tools. In the recent past, many combinational verification algorithms have appeared in the literature...
Jerry R. Burch, Vigyan Singhal
CGI
2004
IEEE
15 years 1 months ago
Real-Time Dynamic Wrinkles
This paper proposes a new method for designing dynamic wrinkles that appear and disappear according to the underlying deformation of tissues. The user positions and orients wrinkl...
Caroline Larboulette, Marie-Paule Cani
ECOWS
2006
Springer
15 years 1 months ago
On the Evaluation of Semantic Web Service Matchmaking Systems
Semantic Web Services are generally considered as the evolution of conventional Web Services. Semantic information included in the service descriptions enables the development of ...
Vassileios Tsetsos, Christos Anagnostopoulos, Stat...
ICMI
2000
Springer
167views Biometrics» more  ICMI 2000»
15 years 1 months ago
Gravity-Center Template Based Human Face Feature Detection
This paper presents a simple and fast technique for geometrical feature detection of several human face organs such as eyes and mouth. Human face gravity-center template is firstly...
Jun Miao, Wen Gao, Yiqiang Chen, Jie Lu
FOCS
1991
IEEE
15 years 1 months ago
A parallel algorithmic version of the Local Lemma
The Lov´asz Local Lemma is a tool that enables one to show that certain events hold with positive, though very small probability. It often yields existence proofs of results with...
Noga Alon