Sciweavers

2767 search results - page 464 / 554
» Universal Exponentiation Algorithm
Sort
View
ICDAR
2005
IEEE
14 years 2 months ago
Tracking, Analysis, and Recognition of Human Gestures in Video
An overview of research in automated gesture spotting, tracking and recognition by the Image and Video Computing Group at Boston University is given. Approaches for localization a...
Stan Sclaroff, Margrit Betke, George Kollios, Jona...
VLSID
2005
IEEE
97views VLSI» more  VLSID 2005»
14 years 2 months ago
Q-PREZ: QBF Evaluation Using Partition, Resolution and Elimination with ZBDDs
In recent years, there has been an increasing interest in Quantified Boolean Formula (QBF) evaluation, since several VLSI CAD problems can be formulated efficiently as QBF insta...
Kameshwar Chandrasekar, Michael S. Hsiao
ATAL
2005
Springer
14 years 2 months ago
Bounded model checking knowledge and branching time in synchronous multi-agent systems
We present an approach to the verification of temporal epistemic properties in synchronous multi-agent systems (MAS) via bounded model checking (BMC). Based on the semantics of s...
Xiangyu Luo, Kaile Su, Abdul Sattar, Qingliang Che...
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
14 years 2 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
CIARP
2005
Springer
14 years 2 months ago
Reward-Punishment Editing for Mixed Data
The KNN rule has been widely used in many pattern recognition problems, but it is sensible to noisy data within the training set, therefore, several sample edition methods have bee...
Raúl Rodríguez-Colín, Jes&uac...