Sciweavers

59 search results - page 12 / 12
» Disjunctive image computation for embedded software verifica...
Sort
View
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
14 years 2 months ago
Is the Open Way a Better Way? Digital Forensics Using Open Source Tools
The subject of digital forensics can be quite challenging. Digital forensics is in its infancy and teaching digital forensics includes the techniques as well as the tools that ass...
Dan Manson, Anna Carlin, Steve Ramos, Alain Gyger,...
DAC
2004
ACM
14 years 8 months ago
Abstraction of assembler programs for symbolic worst case execution time analysis
ion of Assembler Programs for Symbolic Worst Case Execution Time Analysis Tobias Schuele Tobias.Schuele@informatik.uni-kl.de Klaus Schneider Klaus.Schneider@informatik.uni-kl.de Re...
Klaus Schneider, Tobias Schüle
ACMACE
2009
ACM
13 years 11 months ago
Enhancing a motion capture interface by introducing context management
Nowadays, video games propose rich scenarios with movementsbased game play, through the manipulation of dedicated devices. The motivation of this study is the elaboration of a com...
Francois Picard, Pascal Estraillier
MMSEC
2004
ACM
205views Multimedia» more  MMSEC 2004»
14 years 1 months ago
Wavelet-based blind watermarking of 3D models
Watermarking of 3D meshes has received a limited attention due to the difficulties encountered in extending the algorithms developed for 1D (audio) and 2D (images and video) signa...
F. Uccheddu, Massimiliano Corsini, Mauro Barni