Sciweavers

467 search results - page 51 / 94
» Roadmap of Infinite Results
Sort
View
CCS
2008
ACM
13 years 11 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
EPEW
2006
Springer
13 years 11 months ago
The Impact of Buffer Finiteness on the Loss Rate in a Priority Queueing System
This paper discusses five different ways to approximate the loss rate in a fundamental two class priority system, where each class has its own finite capacity buffer, as well as an...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
NIPS
2008
13 years 10 months ago
Dependent Dirichlet Process Spike Sorting
In this paper we propose a new incremental spike sorting model that automatically eliminates refractory period violations, accounts for action potential waveform drift, and can ha...
Jan Gasthaus, Frank Wood, Dilan Görür, Y...
MVA
2007
165views Computer Vision» more  MVA 2007»
13 years 10 months ago
Self-Calibration for Metric 3D Reconstruction Using Homography
In this paper, our goal is to reconstruct metric 3D models for large structures (or other 3D objects) from uncalibrated images. The internal camera parameters are estimated by usi...
Cheng-Yuan Tang, Yi-Leh Wu, Pei-Ching Hu, Hsien-Ch...
CGVR
2006
13 years 10 months ago
Interpolation-Friendly Soft Shadow Maps
We present Penumbra Limit Maps, a technique for rendering soft shadows from a modified shadow map. The shadow representation used by our method has excellent interpolation propert...
Orion Sky Lawlor