Sciweavers

392 search results - page 35 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
AVBPA
2003
Springer
135views Biometrics» more  AVBPA 2003»
14 years 2 months ago
Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS
We compare two classifier approaches, namely classifiers based on Multi Layer Perceptrons (MLPs) and Gaussian Mixture Models (GMMs), for use in a face verification system. The comp...
Fabien Cardinaux, Conrad Sanderson, Sébasti...
CCS
2008
ACM
14 years 22 days ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
ATVA
2006
Springer
153views Hardware» more  ATVA 2006»
14 years 2 months ago
Learning-Based Symbolic Assume-Guarantee Reasoning with Automatic Decomposition
Abstract. Compositional reasoning aims to improve scalability of verification tools by reducing the original verification task into subproblems. The simplification is typically bas...
Wonhong Nam, Rajeev Alur
RTCSA
2000
IEEE
14 years 3 months ago
Scheduling optional computations in fault-tolerant real-time systems
This paper introduces an exact schedulability analysis for the optional computation model urider a specified failure hypothesis. From this analysis, we propose a solutionfor deter...
Pedro Mejía-Alvarez, Hakan Aydin, Daniel Mo...
CORR
2008
Springer
126views Education» more  CORR 2008»
13 years 10 months ago
3D Building Model Fitting Using A New Kinetic Framework
We describe a new approach to fit the polyhedron describing a 3D building model to the point cloud of a Digital Elevation Model (DEM). We introduce a new kinetic framework that hi...
Mathieu Brédif, Didier Boldo, Marc Pierrot ...