Sciweavers

1421 search results - page 212 / 285
» The First and Second Max-SAT Evaluations
Sort
View
SCFBM
2008
119views more  SCFBM 2008»
13 years 10 months ago
Permutation - based statistical tests for multiple hypotheses
Background: Genomics and proteomics analyses regularly involve the simultaneous test of hundreds of hypotheses, either on numerical or categorical data. To correct for the occurre...
Anyela Camargo, Francisco Azuaje, Haiying Wang, Hu...
TROB
2008
228views more  TROB 2008»
13 years 10 months ago
Large-Scale 6-DOF SLAM With Stereo-in-Hand
In this paper, we describe a system that can carry4 out simultaneous localization and mapping (SLAM) in large in-5 door and outdoor environments using a stereo pair moving with 66 ...
Lina María Paz, Pedro Pinies, Juan D. Tard&...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 9 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
MOBIHOC
2010
ACM
13 years 9 months ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...
TACAS
2010
Springer
255views Algorithms» more  TACAS 2010»
13 years 9 months ago
Satisfiability Modulo the Theory of Costs: Foundations and Applications
Abstract. We extend the setting of Satisfiability Modulo Theories (SMT) by introducing a theory of costs C, where it is possible to model and reason about resource consumption and ...
Alessandro Cimatti, Anders Franzén, Alberto...