Sciweavers

14518 search results - page 101 / 2904
» Two Problems for Sophistication
Sort
View
ICST
2009
IEEE
13 years 8 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
EDBT
2004
ACM
131views Database» more  EDBT 2004»
14 years 10 months ago
Declustering Two-Dimensional Datasets over MEMS-Based Storage
Due to the large difference between seek time and transfer time in current disk technology, it is advantageous to perform large I/O using a single sequential access rather than mu...
Hailing Yu, Divyakant Agrawal, Amr El Abbadi
ASWC
2009
Springer
14 years 4 months ago
Two-Fold Service Matchmaking - Applying Ontology Mapping for Semantic Web Service Discovery
Semantic Web Services (SWS) aim at the automated discovery and orchestration of Web services on the basis of comprehensive, machine-interpretable semantic descriptions. Since SWS a...
Stefan Dietze, Neil Benn, John Domingue, Alex Conc...
PRIMA
2009
Springer
14 years 4 months ago
Designing a Two-Sided Matching Protocol under Asymmetric Information
Abstract. We have developed a new two-sided matching protocol including job applicants and employers in the condition that applicants have conditional preferences and well informed...
Masanori Hatanaka, Shigeo Matsubara
ICCV
2007
IEEE
14 years 4 months ago
Two-View Motion Segmentation by Mixtures of Dirichlet Process with Model Selection and Outlier Removal
This paper presents a novel motion segmentation algorithm on the basis of mixture of Dirichlet process (MDP) models, a kind of nonparametric Bayesian framework. In contrast to pre...
Yong-Dian Jian, Chu-Song Chen