Sciweavers

809 search results - page 140 / 162
» Requirements by Contracts allow Automated System Testing
Sort
View
CVPR
2004
IEEE
16 years 1 months ago
Role of Shape and Kinematics in Human Movement Analysis
Human gait and activity analysis from video is presently attracting a lot of attention in the computer vision community. In this paper, we analyze the role of two of the most impo...
Ashok Veeraraghavan, Amit K. Roy Chowdhury, Rama C...
PODC
2012
ACM
13 years 2 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
DAC
2007
ACM
16 years 21 days ago
Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors
Minimizing power consumption is vitally important in embedded system design; power consumption determines battery lifespan. Ultralow-power designs may even permit embedded systems...
Changyun Zhu, Zhenyu (Peter) Gu, Li Shang, Robert ...
LISA
2000
15 years 1 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
ICB
2007
Springer
207views Biometrics» more  ICB 2007»
15 years 3 months ago
Super-Resolved Faces for Improved Face Recognition from Surveillance Video
Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...