Sciweavers

664 search results - page 32 / 133
» Solution to the Counterfeit Coin Problem and its Generalizat...
Sort
View
CL
2012
Springer
13 years 10 days ago
Object swapping challenges: An evaluation of imageSegment
In object-oriented systems, runtime memory is composed of an object graph in which objects refer to other objects. This graph of objects evolves while the system is running. Graph...
Mariano Martinez Peck, Noury Bouraqadi, Sté...
ICPR
2008
IEEE
15 years 4 months ago
Joint segmentation and registration of elastically deformable objects
We present a new approach to the general problem of template-based segmentation, detection, and registration. This joint problem is highly nonlinear and high dimensional, due to t...
Gilad Cohen, Joseph M. Francos, Rami Hagege
TASE
2010
IEEE
14 years 4 months ago
Sensor Placement for Triangulation-Based Localization
Robots operating in a workspace can localize themselves by querying nodes of a sensor-network deployed in the same workspace. This paper addresses the problem of computing the min...
Onur Tekdas, Volkan Isler
ACL2
2006
ACM
15 years 3 months ago
Double rewriting for equivalential reasoning in ACL2
Several users have had problems using equivalence-based rewriting in ACL2 because the ACL2 rewriter caches its results. We describe this problem in some detail, together with a pa...
Matt Kaufmann, J. Strother Moore
CCS
2008
ACM
14 years 12 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...