Sciweavers

253 search results - page 21 / 51
» Imperative self-adjusting computation
Sort
View
ESOP
2008
Springer
13 years 9 months ago
A Hybrid Denotational Semantics for Hybrid Systems
Abstract. In this article, we present a model and a denotational semantics for hybrid systems. Our model is designed to be used for the verification of large, existing embedded app...
Olivier Bouissou, Matthieu Martel
ENTCS
2007
107views more  ENTCS 2007»
13 years 7 months ago
Formal Translation of Bytecode into BoogiePL
Many modern program verifiers translate the program to be verified and its specification into a simple intermediate representation and then compute verification conditions on ...
Hermann Lehner, Peter Müller
TITB
2010
128views Education» more  TITB 2010»
13 years 2 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
FGR
2011
IEEE
227views Biometrics» more  FGR 2011»
12 years 11 months ago
Warp that smile on your face: Optimal and smooth deformations for face recognition
— In this work, we present novel warping algorithms for full 2D pixel-grid deformations for face recognition. Due to high variation in face appearance, face recognition is consid...
Tobias Gass, Leonid Pishchulin, Philippe Dreuw, He...
ICDCS
2011
IEEE
12 years 7 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...