Sciweavers

1159 search results - page 168 / 232
» Binary Decision Graphs
Sort
View
MMB
2010
Springer
185views Communications» more  MMB 2010»
14 years 5 days ago
Correctness Issues of Symbolic Bisimulation Computation for Markov Chains
Abstract. Bisimulation reduction is a classical means to fight the infamous state space explosion problem, which limits the applicability of automated methods for verification li...
Ralf Wimmer, Bernd Becker
ACSD
2007
IEEE
93views Hardware» more  ACSD 2007»
13 years 12 months ago
SAT-based Unbounded Model Checking of Timed Automata
We present an improvement of the SAT-based Unbounded Model Checking (UMC) algorithm. UMC, a symbolic approach introduced in [7], uses propositional formulas in conjunctive normal ...
Wojciech Penczek, Maciej Szreter
CONEXT
2008
ACM
13 years 12 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
COST
2008
Springer
287views Multimedia» more  COST 2008»
13 years 12 months ago
Facial Expressions Recognition from Image Sequences
Abstract. Human machine interaction is one of the emerging fields for the coming years. Interacting with others in our daily life is a face to face interaction. Faces are the natur...
Zahid Riaz, Christoph Mayer, Michael Beetz, Bernd ...
CVPR
2008
IEEE
13 years 12 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long