Sciweavers

641 search results - page 76 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
CSFW
2012
IEEE
12 years 2 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
CAIP
2003
Springer
176views Image Analysis» more  CAIP 2003»
14 years 2 months ago
Evaluation of an Adaptive Composite Gaussian Model in Video Surveillance
Video surveillance systems seek to automatically identify events of interest in a variety of situations. Extracting a moving object from background is the most important step of t...
Qi Zang, Reinhard Klette
DAC
1994
ACM
14 years 1 months ago
Dynamic Search-Space Pruning Techniques in Path Sensitization
A powerful combinational path sensitization engine is required for the efficient implementation of tools for test pattern generation, timing analysis, and delay fault testing. Path...
João P. Marques Silva, Karem A. Sakallah
CPAIOR
2007
Springer
14 years 3 months ago
Cost-Bounded Binary Decision Diagrams for 0-1 Programming
Abstract. In recent work binary decision diagrams (BDDs) were introduced as a technique for postoptimality analysis for integer programming. In this paper we show that much smaller...
Tarik Hadzic, John N. Hooker
TIME
2005
IEEE
14 years 3 months ago
LOLA: Runtime Monitoring of Synchronous Systems
Abstract— We present a specification language and algorithms for the online and offline monitoring of synchronous systems including circuits and embedded systems. Such monitori...
Ben D'Angelo, Sriram Sankaranarayanan, Césa...