Sciweavers

1834 search results - page 309 / 367
» PICTURE - A new Approach for Domain-Specific Process Modelli...
Sort
View
ESORICS
2010
Springer
13 years 9 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
CVIU
2008
179views more  CVIU 2008»
13 years 8 months ago
Incremental, scalable tracking of objects inter camera
This paper presents a scalable solution to the problem of tracking objects across spatially separated, uncalibrated cameras with non overlapping fields of view. The approach relie...
Andrew Gilbert, Richard Bowden
IJVR
2007
202views more  IJVR 2007»
13 years 8 months ago
Full Solid Angle Panoramic Viewing by Depth Image Warping on Field Programmable Gate Array
—To construct 3D virtual scenes from two-dimensional images with depth information, image warping techniques could be used. In this paper, a novel approach of cylindrical depth i...
Xiaoying Li, Baoquan Liu, Enhua Wu
TCAD
2002
73views more  TCAD 2002»
13 years 8 months ago
A timing-constrained simultaneous global routing algorithm
In this paper, we propose a new approach for VLSI interconnect global routing that can optimize both congestion and delay, which are often competing objectives. Our approach provi...
Jiang Hu, Sachin S. Sapatnekar
PROCEDIA
2010
115views more  PROCEDIA 2010»
13 years 7 months ago
Generative topographic mapping by deterministic annealing
Generative Topographic Mapping (GTM) is an important technique for dimension reduction which has been successfully applied to many fields. However the usual Expectation-Maximizat...
Jong Youl Choi, Judy Qiu, Marlon E. Pierce, Geoffr...