Sciweavers

819 search results - page 130 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
89
Voted
ICRA
2007
IEEE
189views Robotics» more  ICRA 2007»
15 years 4 months ago
Context Estimation and Learning Control through Latent Variable Extraction: From discrete to continuous contexts
— Recent advances in machine learning and adaptive motor control have enabled efficient techniques for online learning of stationary plant dynamics and it’s use for robust pre...
Georgios Petkos, Sethu Vijayakumar
77
Voted
ITC
1996
IEEE
78views Hardware» more  ITC 1996»
15 years 2 months ago
Realistic-Faults Mapping Scheme for the Fault Simulation of Integrated Analogue CMOS Circuits
common use is the distinction into two (abstract) fault models: A new fault modelling scheme for integrated analogue general the "Single Hard Fault Model (SHFM)" and the ...
Michael J. Ohletz
88
Voted
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 4 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
IJCV
2007
135views more  IJCV 2007»
14 years 10 months ago
Application of the Fisher-Rao Metric to Ellipse Detection
The parameter space for the ellipses in a two dimensional image is a five dimensional manifold, where each point of the manifold corresponds to an ellipse in the image. The parame...
Stephen J. Maybank
99
Voted
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena