Sciweavers

1722 search results - page 191 / 345
» Generating Tests from Counterexamples
Sort
View
130
Voted
CCS
2006
ACM
15 years 6 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
TNN
2010
168views Management» more  TNN 2010»
14 years 9 months ago
On the selection of weight decay parameter for faulty networks
The weight-decay technique is an effective approach to handle overfitting and weight fault. For fault-free networks, without an appropriate value of decay parameter, the trained ne...
Andrew Chi-Sing Leung, Hongjiang Wang, John Sum
122
Voted
JFR
2008
148views more  JFR 2008»
15 years 2 months ago
Terrain-based vehicle orientation estimation combining vision and inertial measurements
A novel method for estimating vehicle roll, pitch and yaw using machine vision and inertial sensors is presented that is based on matching images captured from an on-vehicle camer...
Vishisht Gupta, Sean Brennan
130
Voted
CRV
2009
IEEE
184views Robotics» more  CRV 2009»
15 years 9 months ago
IceSynth: An Image Synthesis System for Sea-Ice Segmentation Evaluation
An ongoing challenge in automatic sea-ice monitoring using synthetic aperture radar (SAR) is the automatic segmentation of SAR sea-ice images based on the underlying ice type. Giv...
Alexander Wong, Wen Zhang, David A. Clausi
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 2 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim