Sciweavers

528 search results - page 73 / 106
» Construction of concrete verification models from C
Sort
View
MOBIHOC
2005
ACM
14 years 8 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
MICCAI
2007
Springer
14 years 9 months ago
A New Benchmark for Shape Correspondence Evaluation
This paper introduces a new benchmark study of evaluating landmark-based shape correspondence used for statistical shape analysis. Different from previous shape-correspondence eval...
Brent C. Munsell, Pahal Dalal, Song Wang
CC
2009
Springer
142views System Software» more  CC 2009»
14 years 9 months ago
Extensible Proof-Producing Compilation
This paper presents a compiler which produces machine code from functions defined in the logic of a theorem prover, and at the same time proves that the generated code executes the...
Magnus O. Myreen, Konrad Slind, Michael J. C. Gord...
ICIP
2003
IEEE
14 years 1 months ago
Model-based head pose estimation for air-traffic controllers
We present a method for estimating the point of fixation of an air traffic controller from a low resolution video sequence. A geometric model of the head is used to estimate hea...
Xavier L. C. Brolly, Constantinos Stratelos, Jeffr...
MSWIM
2009
ACM
14 years 3 months ago
An enhanced mechanism for efficient assignment of multiple MBMS sessions towards LTE
The provision of rich multimedia services, such as Mobile TV, is considered of key importance for the Long Term Evolution (LTE) proliferation in mobile market. To this direction, ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...