Sciweavers

1219 search results - page 131 / 244
» Verification of Equivalent-Results Methods
Sort
View
140
Voted
SI3D
2010
ACM
15 years 8 months ago
LEAN mapping
We introduce Linear Efficient Antialiased Normal (LEAN) Mapping, a method for real-time filtering of specular highlights in bump and normal maps. The method evaluates bumps as p...
Marc Olano, Dan Baker
CCS
2008
ACM
15 years 5 months ago
Verifiable functional purity in java
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...
146
Voted
SINOBIOMETRICS
2004
Springer
15 years 8 months ago
Component-Based Cascade Linear Discriminant Analysis for Face Recognition
This paper presents a novel face recognition method based on cascade Linear Discriminant Analysis (LDA) of the component-based face representation. In the proposed method, a face i...
Wenchao Zhang, Shiguang Shan, Wen Gao, Yizheng Cha...
ENTCS
2006
145views more  ENTCS 2006»
15 years 3 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
110
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Lightweight object specification with typestates
Previous work has proven typestates to be useful for modeling protocols in object-oriented languages. We build on this work by addressing substitutability of subtypes as well as i...
Kevin Bierhoff, Jonathan Aldrich