Sciweavers

7393 search results - page 1192 / 1479
» Synthesis-for-testability using transformations
Sort
View
126
Voted
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
15 years 10 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
EDOC
2008
IEEE
15 years 10 months ago
EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method
The cost of a telecom service development is correlated to the discontinuity and the complexity of the process. To solve this problem, we propose a method dedicated to telecom ser...
Jacques Simonin, Francis Alizon, Jean-Pierre Desch...
FGR
2008
IEEE
184views Biometrics» more  FGR 2008»
15 years 10 months ago
Multi-attribute robust facial feature localization
In this paper, we focus on the reliable detection of facial fiducial points, such as eye, eyebrow and mouth corners. The proposed algorithm aims to improve automatic landmarking ...
Oya Çeliktutan, Hatice Cinar Akakin, Bü...
FOCS
2008
IEEE
15 years 10 months ago
Unique Games with Entangled Provers are Easy
We consider one-round games between a classical verifier and two provers who share entanglement. We show that when the constraints enforced by the verifier are ‘unique’ cons...
Julia Kempe, Oded Regev, Ben Toner
GLOBECOM
2008
IEEE
15 years 10 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
« Prev « First page 1192 / 1479 Last » Next »