Sciweavers

6978 search results - page 126 / 1396
» Reframing Requirements Analysis
Sort
View
CAIP
2011
Springer
328views Image Analysis» more  CAIP 2011»
13 years 10 months ago
Accurate and Practical Calibration of a Depth and Color Camera Pair
We present an algorithm that simultaneously calibrates a color camera, a depth camera, and the relative pose between them. The method is designed to have three key features that no...
Daniel Herrera C., Juho Kannala, Janne Heikkil&aum...
ICDAR
2011
IEEE
13 years 9 months ago
A Digital Ink Recogntion Server for Handwritten Japanese Text
— This paper describes the design and implementation of a digital ink recognition server for handwritten Japanese text. Currently, fast and accurate recognition of online handwri...
Daqing Wang, Bilan Zhu, Masaki Nakagawa
INFOCOM
2012
IEEE
13 years 8 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ASPDAC
2012
ACM
265views Hardware» more  ASPDAC 2012»
13 years 5 months ago
Improving validation coverage metrics to account for limited observability
—In both pre-silicon and post-silicon validation, the detection of design errors requires both stimulus capable of activating the errors and checkers capable of detecting the beh...
Peter Lisherness, Kwang-Ting Cheng
BIRTHDAY
2012
Springer
13 years 5 months ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...