Sciweavers

2340 search results - page 413 / 468
» Second quarter 2008
Sort
View
VSTTE
2010
Springer
13 years 7 months ago
Dafny Meets the Verification Benchmarks Challenge
A suite of verification benchmarks for software verification tools and techniques, presented at VSTTE 2008 [11], provides an initial catalogue of benchmark challenges for the Verif...
K. Rustan M. Leino, Rosemary Monahan
AFRICACRYPT
2011
Springer
13 years 22 days ago
Really Fast Syndrome-Based Hashing
Abstract. The FSB (fast syndrome-based) hash function was submitted to the SHA-3 competition by Augot, Finiasz, Gaborit, Manuel, and Sendrier in 2008, after preliminary designs pro...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
IOR
2011
96views more  IOR 2011»
13 years 16 days ago
An Ascending Vickrey Auction for Selling Bases of a Matroid
Consider selling bundles of indivisible goods to buyers with concave utilities that are additively separable in money and goods. We propose an ascending auction for the case when ...
Sushil Bikhchandani, Sven de Vries, James Schummer...
CVPR
2008
IEEE
14 years 11 months ago
Automatic face naming with caption-based supervision
We consider two scenarios of naming people in databases of news photos with captions: (i) finding faces of a single person, and (ii) assigning names to all faces. We combine an in...
Matthieu Guillaumin, Thomas Mensink, Jakob J. Verb...
CVPR
2008
IEEE
14 years 11 months ago
Non-refractive modulators for encoding and capturing scene appearance and depth
We analyze the modulation of a light field via nonrefracting attenuators. In the most general case, any desired modulation can be achieved with attenuators having four degrees of ...
Ashok Veeraraghavan, Amit K. Agrawal, Ramesh Raska...