Sciweavers

1585 search results - page 70 / 317
» Automatically optimizing secure computation
Sort
View
CRV
2007
IEEE
137views Robotics» more  CRV 2007»
14 years 2 months ago
Computing View-normalized Body Parts Trajectories
This paper proposes an approach to compute viewnormalized body part trajectories of pedestrians from monocular video sequences. The proposed approach first extracts the 2D trajec...
Frédéric Jean, Robert Bergevin, Alex...
ICMCS
2006
IEEE
114views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Computing a Multimedia Representation for Documents Given Time and Display Constraints
It is difficult to view multipage, high resolution documents on devices with small displays. As a solution, we introduce a Multimedia Thumbnail representation, which can be seen a...
Berna Erol, Kathrin Berkner, Siddharth Joshi, Jona...
IEEESP
2010
99views more  IEEESP 2010»
13 years 6 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
ICSE
2003
IEEE-ACM
14 years 8 months ago
Computer-Assisted Assume/Guarantee Reasoning with VeriSoft
We show how the state space exploration tool VeriSoft can be used to analyze parallel C/C++ programs compositionally. VeriSoft is used to check assume/guarantee specifications of ...
Jürgen Dingel
IFIP
2000
Springer
13 years 11 months ago
Broadway: A Software Architecture for Scientific Computing
Scientific programs rely heavily on software libraries. This paper describes the limitations of this reliance and shows how it degrades software quality. We offer a solution that u...
Samuel Z. Guyer, Calvin Lin