Sciweavers

4693 search results - page 749 / 939
» Verifying Hybrid Systems
Sort
View
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 5 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
CORR
2007
Springer
164views Education» more  CORR 2007»
15 years 5 months ago
Dynamic aspects of individual design activities. A cognitive ergonomics viewpoint
This paper focuses on the use of knowledge possessed by designers. Data collection was based on observations (by the cognitive ergonomics researcher) and simultaneous verbalisation...
Willemien Visser
JFR
2008
148views more  JFR 2008»
15 years 5 months ago
Terrain-based vehicle orientation estimation combining vision and inertial measurements
A novel method for estimating vehicle roll, pitch and yaw using machine vision and inertial sensors is presented that is based on matching images captured from an on-vehicle camer...
Vishisht Gupta, Sean Brennan
105
Voted
ENTCS
2007
70views more  ENTCS 2007»
15 years 5 months ago
Component Substitutability via Equivalencies of Component-Interaction Automata
We provide a new look at formal aspects of component substitutability (replacement of a component with a new one) and independent implementability (reuse of a component in any sys...
Ivana Cerná, Pavlína Vareková...
PR
2006
99views more  PR 2006»
15 years 5 months ago
Authenticating corrupted photo images based on noise parameter estimation
Photo image authentication is an interesting and demanding field in the computer vision and image processing community. This research is motivated by its wide range of application...
Sang-Woong Lee, Ho-Choul Jung, Bon-Woo Hwang, Seon...