Sciweavers

4719 search results - page 798 / 944
» Applications = Components GLoo
Sort
View
ITP
2010
159views Mathematics» more  ITP 2010»
15 years 6 months ago
Programming Language Techniques for Cryptographic Proofs
CertiCrypt is a general framework to certify the security of cryptographic primitives in the Coq proof assistant. CertiCrypt adopts the code-based paradigm, in which the statement ...
Gilles Barthe, Benjamin Grégoire, Santiago ...
CVPR
2009
IEEE
15 years 6 months ago
Efficient image alignment using linear appearance models
Visual tracking is a key component in many computer vision applications. Linear subspace techniques (e.g. eigentracking) are one of the most popular approaches to align templates ...
Jose Gonzalez-Mora, Nicolas Guil, Emilio L. Zapata...
GI
2009
Springer
15 years 6 months ago
Parallelised Gaussian Mixture Filtering for Vehicular Traffic Flow Estimation
: Large traffic network systems require handling huge amounts of data, often distributed over a large geographical region in space and time. Centralised processing is not then the ...
Lyudmila Mihaylova, Amadou Gning, Viktor Doychinov...
128
Voted
HOST
2009
IEEE
15 years 6 months ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...
ICESS
2007
Springer
15 years 6 months ago
An Analyzer of the User Event for Interactive DMB
Abstract. The interactive digital multimedia broadcasting stands for a convergence application between digital multimedia broadcasting service and wireless internet service. It dev...
Hlaing Su Khin, Sangwook Kim