Sciweavers

977 search results - page 40 / 196
» Soft Constraints for Security
Sort
View
CVPR
2012
IEEE
13 years 10 days ago
Bag of textons for image segmentation via soft clustering and convex shift
We propose an unsupervised image segmentation method based on texton similarity and mode seeking. The input image is first convolved with a filter-bank, followed by soft cluster...
Zhiding Yu, Ang Li, Oscar C. Au, Chunjing Xu
GLOBECOM
2006
IEEE
15 years 4 months ago
Adaptive MIMO-OFDM Cellular System with Soft Handover between Distributed Base Station Antennas
— The joint cooperative processing of transmitted signal from several multiple-input multiple-output (MIMO) base station (BS) antenna heads is considered for users located within...
Antti Tölli, Marian Codreanu, Markku J. Juntt...
CASES
2009
ACM
15 years 4 months ago
CheckerCore: enhancing an FPGA soft core to capture worst-case execution times
Embedded processors have become increasingly complex, resulting in variable execution behavior and reduced timing predictability. On such processors, safe timing specifications e...
Jin Ouyang, Raghuveer Raghavendra, Sibin Mohan, Ta...
RTS
2002
154views more  RTS 2002»
14 years 9 months ago
Flexible Soft Real-Time Processing in Middleware
As desktop computer computational power continues to increases dramatically, it is becoming commonplace to run a combination of deadline-sensitive applications. Despite the prolif...
Scott A. Brandt, Gary J. Nutt
CONCUR
2005
Springer
15 years 3 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters