Sciweavers

9626 search results - page 23 / 1926
» Invariant Based Programming
Sort
View
ESOP
2003
Springer
14 years 2 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
CAV
2008
Springer
161views Hardware» more  CAV 2008»
13 years 11 months ago
Constraint-Based Approach for Analysis of Hybrid Systems
Abstract. This paper presents a constraint-based technique for discovering a rich class of inductive invariants (boolean combinations of polynomial inequalities of bounded degree) ...
Sumit Gulwani, Ashish Tiwari
CISST
2003
171views Hardware» more  CISST 2003»
13 years 11 months ago
Image Registration and Conflation Based on Structural Characteristics
An approach to conflation/registration of images that does not depend on identifying common points is being developed. It uses the method of algebraic invariants to provide a comm...
Boris Kovalerchuk, William Sumner, James L. Schwin...
PLDI
2003
ACM
14 years 2 months ago
Taming the IXP network processor
We compile Nova, a new language designed for writing network processing applications, using a back end based on integer-linear programming (ILP) for register allocation, optimal b...
Lal George, Matthias Blume
ICIP
2001
IEEE
14 years 11 months ago
Extraction of rotation invariant signature based on fractal geometry
In this paper, a new method of feature extraction with rotation invariant property is presented. One of the main contributions of this study is that a rotation invariant signature...
Yu Tao, Thomas R. Ioerger, Yuan Yan Tang