Sciweavers

1017 search results - page 86 / 204
» On the Power of k -Consistency
Sort
View
CAIP
2009
Springer
252views Image Analysis» more  CAIP 2009»
14 years 4 months ago
Incorporating Shape Features in an Appearance-Based Object Detection System
Most object detection techniques discussed in the literature are based solely on texture-based features that capture the global or local appearance of an object. While results indi...
Gurman Gill, Martin Levine
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
14 years 4 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
ATAL
2005
Springer
14 years 3 months ago
Bounded model checking knowledge and branching time in synchronous multi-agent systems
We present an approach to the verification of temporal epistemic properties in synchronous multi-agent systems (MAS) via bounded model checking (BMC). Based on the semantics of s...
Xiangyu Luo, Kaile Su, Abdul Sattar, Qingliang Che...
CSREAESA
2006
13 years 11 months ago
Delay-Reduced Combinational Logic Synthesis using Multiplexers
- This paper presents an approach to obtain reduced hardware and/or delay for synthesizing logic functions using multiplexers. Replication of single control line multiplexer is use...
Rekha K. James, T. K. Shahana, K. Poulose Jacob, S...
CORR
2008
Springer
119views Education» more  CORR 2008»
13 years 10 months ago
Capacity of the Discrete-Time AWGN Channel Under Output Quantization
We investigate the limits of communication over the discrete-time Additive White Gaussian Noise (AWGN) channel, when the channel output is quantized using a small number of bits. W...
Jaspreet Singh, Onkar Dabeer, Upamanyu Madhow