Sciweavers

916 search results - page 80 / 184
» Using redundancies to find errors
Sort
View
COMCOM
2000
97views more  COMCOM 2000»
14 years 9 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
ANLP
1997
84views more  ANLP 1997»
14 years 11 months ago
High Performance Segmentation of Spontaneous Speech Using Part of Speech and Trigger Word Information
We describe and experimentally evaluate an efficient method for automatically determining small clause boundaries in spontaneous speech. Our method applies an artificial neural ne...
Marsal Gavaldà, Klaus Zechner, Gregory Aist
ICIP
2005
IEEE
15 years 11 months ago
JPEG 2000 scalar quantization using an optimally frequency localized modulated lapped transform
JPEG 2000 is a lossy integer-to-integer transform-based compression method that first quantizes the separable 2-D wavelet transform coefficients, then entropy codes them. The imag...
Peter C. Tay, Joseph P. Havlicek
ICPR
2008
IEEE
15 years 11 months ago
Solving quadratically constrained geometrical problems using lagrangian duality
In this paper we consider the problem of solving different pose and registration problems under rotational constraints. Traditionally, methods such as the iterative closest point ...
Carl Olsson, Anders Eriksson
UAI
2008
14 years 11 months ago
Strategy Selection in Influence Diagrams using Imprecise Probabilities
This paper describes a new algorithm to solve the decision making problem in Influence Diagrams based on algorithms for credal networks. Decision nodes are associated to imprecise...
Cassio Polpo de Campos, Qiang Ji