Sciweavers

964 search results - page 131 / 193
» Scenario-driven modeling and validation of requirements mode...
Sort
View
ISCI
2008
86views more  ISCI 2008»
13 years 9 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
PAMI
2008
132views more  PAMI 2008»
13 years 9 months ago
Trajectory Association across Multiple Airborne Cameras
A camera mounted on an aerial vehicle provides an excellent means to monitor large areas of a scene. Utilizing several such cameras on different aerial vehicles allows further flex...
Yaser Sheikh, Mubarak Shah
TAP
2008
Springer
102views Hardware» more  TAP 2008»
13 years 9 months ago
A Logic-Based Approach to Combinatorial Testing with Constraints
Abstract. Usage of combinatorial testing is wide spreading as an effective technique to reveal unintended feature interaction inside a given system. To this aim, test cases are con...
Andrea Calvagna, Angelo Gargantini
CCE
2005
13 years 9 months ago
Logic-based outer approximation for globally optimal synthesis of process networks
Process network problems can be formulated as Generalized Disjunctive Programs where a logicbased representation is used to deal with the discrete and continuous decisions. A new ...
María Lorena Bergamini, Pío A. Aguir...
PIMRC
2010
IEEE
13 years 7 months ago
Opportunistic channel access scheme for cognitive radio system based on residual white space distribution
We propose an opportunistic channel access scheme for cognitive radio-enabled secondary networks. In our work, we model the channel occupancy due to Primary User (PU) activity as a...
Manuj Sharma, Anirudha Sahoo