Sciweavers

6978 search results - page 126 / 1396
» Reframing Requirements Analysis
Sort
View
CAIP
2011
Springer
328views Image Analysis» more  CAIP 2011»
14 years 5 months ago
Accurate and Practical Calibration of a Depth and Color Camera Pair
We present an algorithm that simultaneously calibrates a color camera, a depth camera, and the relative pose between them. The method is designed to have three key features that no...
Daniel Herrera C., Juho Kannala, Janne Heikkil&aum...
152
Voted
ICDAR
2011
IEEE
14 years 4 months ago
A Digital Ink Recogntion Server for Handwritten Japanese Text
— This paper describes the design and implementation of a digital ink recognition server for handwritten Japanese text. Currently, fast and accurate recognition of online handwri...
Daqing Wang, Bilan Zhu, Masaki Nakagawa
343
Voted
INFOCOM
2012
IEEE
14 years 3 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ASPDAC
2012
ACM
265views Hardware» more  ASPDAC 2012»
14 years 23 days ago
Improving validation coverage metrics to account for limited observability
—In both pre-silicon and post-silicon validation, the detection of design errors requires both stimulus capable of activating the errors and checkers capable of detecting the beh...
Peter Lisherness, Kwang-Ting Cheng
BIRTHDAY
2012
Springer
14 years 23 days ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...