Sciweavers

1968 search results - page 262 / 394
» The Complexity of Valued Constraint Models
Sort
View
SRDS
1999
IEEE
15 years 2 months ago
Formal Hazard Analysis of Hybrid Systems in cTLA
Hybrid systems like computer-controlled chemical plants are typical safety critical distributed systems. In present practice, the safety of hybrid systems is guaranteed by hazard ...
Peter Herrmann, Heiko Krumm
STOC
2004
ACM
129views Algorithms» more  STOC 2004»
15 years 10 months ago
Sorting and searching in the presence of memory faults (without redundancy)
We investigate the design of algorithms resilient to memory faults, i.e., algorithms that, despite the corruption of some memory values during their execution, are able to produce...
Irene Finocchi, Giuseppe F. Italiano
3DPVT
2006
IEEE
215views Visualization» more  3DPVT 2006»
15 years 4 months ago
Region-Based Motion Analysis and 3D Reconstruction for a Translational Video Sequence
This paper presents a hybrid 1D motion estimation algorithm which combines pixel-based and region-based approaches that can give depth images from translational video sequences wi...
Xiaodong Huang, Eric Dubois
SIBGRAPI
2006
IEEE
15 years 4 months ago
Duality between the Watershed by Image Foresting Transform and the Fuzzy Connectedness Segmentation Approaches
This paper makes a rereading of two successful image segmentation approaches, the fuzzy connectedness (FC) and the watershed (WS) approaches, by analyzing both by means of the Ima...
Romaric Audigier, Roberto de Alencar Lotufo
ASIACRYPT
2005
Springer
15 years 3 months ago
Revealing Additional Information in Two-Party Computations
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Andreas Jakoby, Maciej Liskiewicz