Sciweavers

2435 search results - page 395 / 487
» System Exploration of SystemC Designs
Sort
View
AND
2009
15 years 2 months ago
Tools for monitoring, visualizing, and refining collections of noisy documents
Developing better systems for document image analysis requires understanding errors, their sources, and their effects. The interactions between various processing steps are comple...
Daniel P. Lopresti, George Nagy
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
15 years 2 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ECRTS
2009
IEEE
15 years 2 months ago
Precise Worst-Case Execution Time Analysis for Processors with Timing Anomalies
This paper explores timing anomalies in WCET analysis. Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify ...
Raimund Kirner, Albrecht Kadlec, Peter P. Puschner
ICCV
2011
IEEE
14 years 4 months ago
HMDB: A Large Video Database for Human Motion Recognition
With nearly one billion online videos viewed everyday, an emerging new frontier in computer vision research is recognition and search in video. While much effort has been devoted ...
Hildegard Kuehne, Hueihan Jhuang, Estibaliz Garrot...
POST
2012
218views more  POST 2012»
13 years 12 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...