Sciweavers

4985 search results - page 992 / 997
» Observation of String-Rewriting Systems
Sort
View
144
Voted
EMSOFT
2010
Springer
15 years 19 days ago
From high-level component-based models to distributed implementations
Constructing correct distributed systems from their high-level models has always been a challenge and often subject to serious errors because of their non-deterministic and non-at...
Borzoo Bonakdarpour, Marius Bozga, Mohamad Jaber, ...
155
Voted
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 19 days ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
131
Voted
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
15 years 18 days ago
Application-Aware diagnosis of runtime hardware faults
Extreme technology scaling in silicon devices drastically affects reliability, particularly because of runtime failures induced by transistor wearout. Currently available online t...
Andrea Pellegrini, Valeria Bertacco
130
Voted
ICIP
2010
IEEE
15 years 18 days ago
Enhanced prediction for motion estimation in Scalable Video Coding
In this paper, we present a temporal candidate generation scheme that can be applied to motion estimators in Scalable Video Codecs (SVCs). For bidirectional motion estimation, usu...
Marijn J. H. Loomans, Cornelis J. Koeleman, Peter ...
104
Voted
ICPR
2010
IEEE
15 years 17 days ago
Patch-Based Similarity HMMs for Face Recognition with a Single Reference Image
In this paper we present a new architecture for face recognition with a single reference image, which completely separates the training process from the recognition process. In th...
Ngoc-Son Vu, Alice Caplier