Sciweavers

2585 search results - page 183 / 517
» computing 1999
Sort
View
104
Voted
DAC
1999
ACM
15 years 8 months ago
Hardware Reuse at the Behavioral Level
Standard interfaces for hardware reuse are currently de ned at the structural level. In contrast to this, our contribution de nes the reuse interface at the behavioral registertra...
Patrick Schaumont, Radim Cmar, Serge Vernalde, Mar...
131
Voted
CQRE
1999
Springer
15 years 8 months ago
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In response to [SM98], Microsoft released extensions to the PPTP authentication me...
Bruce Schneier, Mudge, David Wagner
134
Voted
ERSHOV
1999
Springer
15 years 8 months ago
Multi-agent Optimal Path Planning for Mobile Robots in Environment with Obstacles
Abstract. The paper describes a problem of multi-agent path planning in environment with obstacles. Novel approach to multi-agent optimal path planning, using graph representation ...
Fedor A. Kolushev, Alexander A. Bogdanov
ERSHOV
1999
Springer
15 years 8 months ago
On Perfect Supercompilation
We extend positive supercompilation to handle negative as well as positive information. This is done by instrumenting the underlying unfold rules with a small rewrite system that h...
Jens P. Secher, Morten Heine Sørensen
SIBGRAPI
1999
IEEE
15 years 8 months ago
An Image Processing and Belief Network Approach to Face Detection
This work describes an approach for face detection, which is the rst stage of any fully automatedhumanface recognition system. We propose several enhancements to a feature-based ap...
Paulo Sérgio de Souza Coelho, Claudio Esper...