Sciweavers

169 search results - page 28 / 34
» From Operating-System Correctness to Pervasively Verified Ap...
Sort
View
ICCV
2005
IEEE
15 years 8 days ago
Prior-Based Segmentation by Projective Registration and Level Sets
Object detection and segmentation can be facilitated by the availability of a reference object. However, accounting for possible transformations between the different object views...
Tammy Riklin-Raviv, Nahum Kiryati, Nir A. Sochen
DAC
1999
ACM
14 years 11 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak
WSCG
2004
148views more  WSCG 2004»
13 years 11 months ago
Inverse Rendering of Polished Materials under Constant Complex Uncontrolled Illumination
Inverse rendering infers realistic descriptions of illumination and material properties from photographs. However, the applicability of state of the art inverse rendering algorith...
Michael Bang Nielsen, Anders Brodersen
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
14 years 5 months ago
System-level hardware-based protection of memories against soft-errors
We present a hardware-based approach to improve the resilience of a computer system against the errors occurred in the main memory with the help of error detecting and correcting ...
Valentin Gherman, Samuel Evain, Mickael Cartron, N...
CCS
2007
ACM
14 years 4 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor