Sciweavers

3096 search results - page 511 / 620
» Theory and Use of the EM Algorithm
Sort
View
ISW
2007
Springer
14 years 3 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
14 years 3 months ago
Equivalence verification of arithmetic datapaths with multiple word-length operands
Abstract: This paper addresses the problem of equivalence verification of RTL descriptions that implement arithmetic computations (add, mult, shift) over bitvectors that have di...
Namrata Shekhar, Priyank Kalla, Florian Enescu
FOCS
2006
IEEE
14 years 3 months ago
Approximate Min-Max Theorems of Steiner Rooted-Orientations of Hypergraphs
Given an undirected hypergraph and a subset of vertices S ⊆ V with a specified root vertex r ∈ S, the STEINER ROOTED-ORIENTATION problem is to find an orientation of all the...
Tamás Király, Lap Chi Lau
IROS
2006
IEEE
197views Robotics» more  IROS 2006»
14 years 2 months ago
Heterogeneous Multi-Robot Localization in Unknown 3D Space
— This paper presents a self-localization strategy for a team of heterogenous mobile robots, including ground mobile robots of various sizes and wall-climbing robots. These robot...
Yi Feng 0002, Zhigang Zhu, Jizhong Xiao
PRDC
2006
IEEE
14 years 2 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....