Sciweavers

10700 search results - page 2043 / 2140
» Generative Design Patterns
Sort
View
ICST
2009
IEEE
14 years 5 months ago
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
It is challenging to test applications and functions for which the correct output for arbitrary input cannot be known in advance, e.g. some computational science or machine learni...
Christian Murphy, Kuang Shen, Gail E. Kaiser
INFOCOM
2009
IEEE
14 years 5 months ago
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Abstract—Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed arc...
Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang
ISMAR
2009
IEEE
14 years 5 months ago
A dataset and evaluation methodology for template-based tracking algorithms
Unlike dense stereo, optical flow or multi-view stereo, templatebased tracking lacks benchmark datasets allowing a fair comparison between state-of-the-art algorithms. Until now,...
Sebastian Lieberknecht, Selim Benhimane, Peter Geo...
ASIACRYPT
2009
Springer
14 years 5 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
ATAL
2009
Springer
14 years 5 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
« Prev « First page 2043 / 2140 Last » Next »