Sciweavers

1818 search results - page 233 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
112
Voted
CAV
2012
Springer
265views Hardware» more  CAV 2012»
13 years 6 months ago
An Axiomatic Memory Model for POWER Multiprocessors
The growing complexity of hardware optimizations employed by multiprocessors leads to subtle distinctions among allowed and disallowed behaviors, posing challenges in specifying th...
Sela Mador-Haim, Luc Maranget, Susmit Sarkar, Kayv...
104
Voted
ICIP
2007
IEEE
16 years 5 months ago
The Hough Transform's Implicit Bayesian Foundation
This paper shows that the basic Hough transform is implicitly a Bayesian process--that it computes an unnormalized posterior distribution over the parameters of a single shape giv...
Neil Toronto, Bryan S. Morse, Dan Ventura, Kevin D...
IV
2009
IEEE
117views Visualization» more  IV 2009»
15 years 10 months ago
Evaluation of Overcluttering Prevention Techniques for Mobile Devices
The increasing popularity of mobile devices has fostered the development of visualization applications for these devices. However, the reduced screen size and different interactio...
Paulo Miguel Pombinho de Matos, Maria Beatriz Carm...
ICRA
2008
IEEE
105views Robotics» more  ICRA 2008»
15 years 10 months ago
A ladybug exploration strategy for distributed adaptive coverage control
— A control strategy inspired by the hunting tactics of ladybugs is presented to simultaneously achieve sensor coverage and exploration of an area with a group of networked robot...
Mac Schwager, Francesco Bullo, David Skelly, Danie...
112
Voted
ACISP
2008
Springer
15 years 10 months ago
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Abstract. This paper presents a critical analysis of the AACS drivehost authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. I...
Jiayuan Sui, Douglas R. Stinson