Sciweavers

288 search results - page 39 / 58
» A Conservation Law for Generalization Performance
Sort
View
SACMAT
2010
ACM
14 years 11 days ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
ARC
2006
Springer
157views Hardware» more  ARC 2006»
13 years 11 months ago
PISC: Polymorphic Instruction Set Computers
We introduce a new paradigm in the computer architecture referred to as Polymorphic Instruction Set Computers (PISC). This new paradigm, in difference to RISC/CISC, introduces hard...
Stamatis Vassiliadis, Georgi Kuzmanov, Stephan Won...
CORR
2006
Springer
78views Education» more  CORR 2006»
13 years 7 months ago
Opti{c,m}al: Optical/Optimal Routing in Massively Dense Wireless Networks
Abstract-- We study routing for massively dense wireless networks, i.e., wireless networks that contain so many nodes that, in addition to their usual microscopic description, a no...
Roberto Catanuto, Stavros Toumpis, Giacomo Morabit...
IJCV
2000
132views more  IJCV 2000»
13 years 7 months ago
2 1/2 D Visual Servoing with Respect to Unknown Objects Through a New Estimation Scheme of Camera Displacement
Classical visual servoing techniques need a strong a priori knowledge of the shape and the dimensions of the observed objects. In this paper, we present how the 2 1/2 D visual serv...
Ezio Malis, François Chaumette
PAMI
2002
136views more  PAMI 2002»
13 years 7 months ago
On the Individuality of Fingerprints
Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerpr...
Sharath Pankanti, Salil Prabhakar, Anil K. Jain