Sciweavers

17789 search results - page 3534 / 3558
» Exceptional Use Cases
Sort
View
ICIP
2009
IEEE
13 years 5 months ago
Randomness-in-Structured Ensembles for compressed sensing of images
Leading compressed sensing (CS) methods require m = O (k log(n)) compressive samples to perfectly reconstruct a k-sparse signal x of size n using random projection matrices (e.g., ...
Abdolreza A. Moghadam, Hayder Radha
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 5 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
ICRA
2009
IEEE
115views Robotics» more  ICRA 2009»
13 years 5 months ago
Trajectory generation of robotic fingers based on tri-axial tactile data for cap screwing task
In a previous paper, we developed a robotic finger equipped with optical three-axis tactile sensors, of which the sensing cell can separately detect normal and shearing forces. Wit...
Masahiro Ohka, Nobuyuki Morisawa, Hanafiah B. Yuss...
ICTAC
2009
Springer
13 years 5 months ago
Integration Testing from Structured First-Order Specifications via Deduction Modulo
Testing from first-order specifications has mainly been studied for flat specifications, that are specifications of a single software module. However, the specifications of large s...
Delphine Longuet, Marc Aiguier
ICTAC
2009
Springer
13 years 5 months ago
A First-Order Policy Language for History-Based Transaction Monitoring
Online trading invariably involves dealings between strangers, so it is important for one party to be able to judge objectively the trustworthiness of the other. In such a setting,...
Andreas Bauer 0002, Rajeev Goré, Alwen Tiu
« Prev « First page 3534 / 3558 Last » Next »