Sciweavers

1920 search results - page 282 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
118
Voted
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
15 years 9 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
IJCAI
2003
15 years 5 months ago
Generalizing GraphPlan by Formulating Planning as a CSP
We examine the approach of encoding planning problems as CSPs more closely. First we present a simple CSP encoding for planning problems and then a set of transformations that can...
Adriana Lopez, Fahiem Bacchus
PRL
2006
115views more  PRL 2006»
15 years 3 months ago
A hybrid parallel projection approach to object-based image restoration
Approaches analyzing local characteristics of an image prevail in image restoration. However, they are less effective in cases of restoring images degraded by large size point spr...
Xin Fan, Hua Huang, Dequn Liang, Chun Qi
TSE
2010
161views more  TSE 2010»
15 years 2 months ago
Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking
— Web script crashes and malformed dynamically-generated web pages are common errors, and they seriously impact the usability of web applications. Current tools for web-page vali...
Shay Artzi, Adam Kiezun, Julian Dolby, Frank Tip, ...
AVSS
2009
IEEE
15 years 1 months ago
Multimodal Abandoned/Removed Object Detection for Low Power Video Surveillance Systems
Low-cost and low-power video surveillance systems based on networks of wireless video sensors will enter soon the marketplace with the promise of flexibility, quick deployment an...
Michele Magno, Federico Tombari, Davide Brunelli, ...