Sciweavers

3106 search results - page 161 / 622
» Both Generic Design and Different Forms of Designing
Sort
View
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
15 years 10 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget
ICRA
2006
IEEE
76views Robotics» more  ICRA 2006»
15 years 10 months ago
A Robotized Positioning Platform guided by Computed Tomography: Practical Issues and Evaluation
Abstract— Medical robotics is a field where dedicated mechanisms have an increasing importance. The strong operating room constraints, both medical and practical, lead to heavil...
Benjamin Maurin, Bernard Bayle, Jacques Gangloff, ...
ADAEUROPE
2006
Springer
15 years 10 months ago
Interchangeable Scheduling Policies in Real-Time Middleware for Distribution
When a middleware layer is designed for providing semi-transparent distribution facilities to real-time applications, a trade-off must be made between the expressiveness and contro...
Juan López Campos, J. Javier Gutiérr...
ASAP
2009
IEEE
131views Hardware» more  ASAP 2009»
15 years 9 months ago
Constraint-Driven Instructions Selection and Application Scheduling in the DURASE system
This paper presents a new constraint-driven method for computational pattern selection, mapping and application scheduling using reconfigurable processor extensions. The presente...
Kevin Martin, Christophe Wolinski, Krzysztof Kuchc...
PAMI
2012
13 years 7 months ago
Tracking-Learning-Detection
A novel system for long-term tracking of a human face in unconstrained videos is built on Tracking-Learning-Detection (TLD) approach. The system extends TLD with the concept of a ...
Zdenek Kalal, Krystian Mikolajczyk, Jiri Matas