Sciweavers

222 search results - page 40 / 45
» Efficient assertion based verification using TLM
Sort
View
CVPR
2007
IEEE
14 years 11 months ago
Learning Features for Tracking
We treat tracking as a matching problem of detected keypoints between successive frames. The novelty of this paper is to learn classifier-based keypoint descriptions allowing to i...
Michael Grabner, Helmut Grabner, Horst Bischof
ATVA
2006
Springer
131views Hardware» more  ATVA 2006»
14 years 1 months ago
Timed Unfoldings for Networks of Timed Automata
Whereas partial order methods have proved their efficiency for the analysis of discrete-event systems, their application to timed systems remains a challenging research topic. Here...
Patricia Bouyer, Serge Haddad, Pierre-Alain Reynie...
SIMUTOOLS
2008
13 years 11 months ago
Real-time emulation of networked robot systems
In this paper we present a methodology for the evaluation of networked systems communicating using WLAN technology. We show a case study of goal-oriented cooperating robots, for w...
Razvan Beuran, Junya Nakata, Takashi Okada, Yasuo ...
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
CCS
2006
ACM
14 years 1 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven