Sciweavers

3695 search results - page 705 / 739
» Design patterns for parsing
Sort
View
FSTTCS
2003
Springer
14 years 1 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
IBPRIA
2003
Springer
14 years 1 months ago
A Colour Tracking Procedure for Low-Cost Face Desktop Applications
In this paper we present an environment for the tracking of a human face obtained from a real video sequence. We will describe the system and discuss the advantages and disadvanta...
Francisco J. Perales López, Ramon Mas, Miqu...
IMR
2003
Springer
14 years 1 months ago
An Adaptable Surface Parameterization Method
Parameterizations of triangulated surfaces are used in an increasing number of mesh processing applications for various purposes. Although demands vary, they are often required to...
Patrick Degener, Jan Meseth, Reinhard Klein
ICRA
2002
IEEE
101views Robotics» more  ICRA 2002»
14 years 1 months ago
Rover Autonomy for Long Range Navigation and Science Data Acquisition on Planetary Surfaces
This paper describes recent work undertaken at the Jet Propulsion Laboratory in Pasadena, CA in the area of increased rover autonomy for planetary surface operations. The primary ...
Terrance L. Huntsberger, Hrand Aghazarian, Yang Ch...
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
14 years 1 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang