Sciweavers

941 search results - page 131 / 189
» The Second Order Particle System
Sort
View
DATE
2009
IEEE
90views Hardware» more  DATE 2009»
15 years 4 months ago
Property analysis and design understanding
—Verification is a major issue in circuit and system design. Formal methods like bounded model checking (BMC) can guarantee a high quality of the verification. There are severa...
Ulrich Kühne, Daniel Große, Rolf Drechs...
SP
2009
IEEE
15 years 4 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
ICSM
2009
IEEE
15 years 4 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
ICMI
2009
Springer
95views Biometrics» more  ICMI 2009»
15 years 4 months ago
Salience in the generation of multimodal referring acts
Pointing combined with verbal referring is one of the most paradigmatic human multimodal behaviours. The aim of this paper is foundational: to uncover the central notions that are...
Paul Piwek
SAT
2009
Springer
91views Hardware» more  SAT 2009»
15 years 4 months ago
VARSAT: Integrating Novel Probabilistic Inference Techniques with DPLL Search
Probabilistic inference techniques can be used to estimate variable bias, or the proportion of solutions to a given SAT problem that fix a variable positively or negatively. Metho...
Eric I. Hsu, Sheila A. McIlraith