Sciweavers

1024 search results - page 91 / 205
» Value complete, column complete, predicate complete
Sort
View
108
Voted
ACSAC
2009
IEEE
15 years 8 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...
IROS
2009
IEEE
155views Robotics» more  IROS 2009»
15 years 8 months ago
Active learning using mean shift optimization for robot grasping
— When children learn to grasp a new object, they often know several possible grasping points from observing a parent’s demonstration and subsequently learn better grasps by tr...
Oliver Kroemer, Renaud Detry, Justus H. Piater, Ja...
123
Voted
HICSS
2005
IEEE
161views Biometrics» more  HICSS 2005»
15 years 7 months ago
Data Assurance in a Conventional File Systems
The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goa...
Sasa Rudan, Aleksandra Kovacevic, Charles A. Milli...
RTSS
2000
IEEE
15 years 6 months ago
An Incremental Approach to Scheduling during Overloads in Real-Time Systems
In this paper we propose a novel scheduling framework for a real-timeenvironmentthat experiences dynamic changes. Thisframework is capable of adjusting the system workload in incr...
Pedro Mejía-Alvarez, Rami G. Melhem, Daniel...
ASWEC
2007
IEEE
15 years 5 months ago
Managing Conflicts When Using Combination Strategies to Test Software
Testers often represent systems under test in input parameter models. These contain parameters with associated values. Combinations of parameter values, with one value for each pa...
Mats Grindal, Jeff Offutt, Jonas Mellin