Sciweavers

457 search results - page 69 / 92
» Distributed verification with LoLA
Sort
View
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 1 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ATAL
2005
Springer
14 years 1 months ago
A software tool for the development of MAS communication protocols based on conversations
The work we present here is mainly concerned with interagent communication, MAS communication protocols and, in particular, software tools and environments to define, experiment a...
Madieyna Lamine Fall, Sylvain Delisle
SIGDOC
2003
ACM
14 years 26 days ago
Liability for defective documentation
Several companies are careless about the accuracy of their user manuals and online help, leading readers to believe that a product has characteristics that it lacks. Under America...
Cem Kaner
FMSD
2002
114views more  FMSD 2002»
13 years 7 months ago
The Correctness of the Fast Fourier Transform: A Structured Proof in ACL2
The powerlists data structure, created by Misra in the early 90s, is well suited to express recursive, data-parallel algorithms. Misra has shown how powerlists can be used to give ...
Ruben Gamboa
ISAMI
2010
13 years 5 months ago
Employing Compact Intra-genomic Language Models to Predict Genomic Sequences and Characterize Their Entropy
Probabilistic models of languages are fundamental to understand and learn the profile of the subjacent code in order to estimate its entropy, enabling the verification and predicti...
Sérgio A. D. Deusdado, Paulo Carvalho