Sciweavers

581 search results - page 90 / 117
» Translating dependency into parametricity
Sort
View
AVSS
2005
IEEE
14 years 3 months ago
Clustering of human actions using invariant body shape descriptor and dynamic time warping
We propose a human action clustering method based on a 3D representation of the body in terms of volumetric coordinates. Features representing body postures are extracted directly...
Massimiliano Pierobon, Marco Marcon, Augusto Sarti...
WORDS
2005
IEEE
14 years 3 months ago
Enhancing DNS Security using the SSL Trust Infrastructure
The main functionality of the Domain Name System (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, ...
Christof Fetzer, Gert Pfeifer, Trevor Jim
IMC
2005
ACM
14 years 3 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
ISLPED
2005
ACM
101views Hardware» more  ISLPED 2005»
14 years 3 months ago
Defocus-aware leakage estimation and control
Leakage power is one of the most critical issues for ultra-deep submicron technology. Subthreshold leakage depends exponentially on linewidth, and consequently variation in linewi...
Andrew B. Kahng, Swamy Muddu, Puneet Sharma
TACAS
2005
Springer
88views Algorithms» more  TACAS 2005»
14 years 3 months ago
Shortest Counterexamples for Symbolic Model Checking of LTL with Past
Shorter counterexamples are typically easier to understand. The length of a counterexample, as reported by a model checker, depends on both the algorithm used for state space explo...
Viktor Schuppan, Armin Biere