Search for dissertations about: "Bounding"

Showing result 1 - 5 of 67 swedish dissertations containing the word Bounding.

  1. 1. Effective Techniques for Stateless Model Checking

    Author : Stavros Aronis; Konstantinos Sagonas; Bengt Jonsson; Patrice Godefroid; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Concurrent; Parallel; Model Checking; Partial Order Reduction; Dynamic Partial Order Reduction; DPOR; Sleep Set Blocking; Source Sets; Source DPOR; Wakeup Trees; Optimal DPOR; Observers; Verification; Bounding; Exploration Tree Bounding; Testing; Erlang; Concuerror; Protocol; Chain Replication; CORFU; Computer Science; Datavetenskap;

    Abstract : Stateless model checking is a technique for testing and verifying concurrent programs, based on exploring the different ways in which operations executed by the processes of a concurrent program can be scheduled. The goal of the technique is to expose all behaviours that can be a result of scheduling non-determinism. READ MORE

  2. 2. Adaptive Bounding Volume Hierarchies for Efficient Collision Queries

    Author : Thomas Larsson; Björn Lisper; Tomas Akenine-Möller; Stefane Redon; Mälardalens högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Bounding volume hierarchies; Collision detection; Rigid bodies; Deformable models; Data structures; Simulation; Animation; Three-dimensional graphics and realism; Computer science; Datavetenskap; Datavetenskap;

    Abstract : The need for efficient interference detection frequently arises in computer graphics, robotics, virtual prototyping, surgery simulation, computer games, and visualization. To prevent bodies passing directly through each other, the simulation system must be able to track touching or intersecting geometric primitives. READ MORE

  3. 3. Authentication under Constraints

    Author : Elena Pagnin; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Security.; Distance-Bounding; Privacy; Biometrics; Anonymity; Authentication; Digital Signatures;

    Abstract : Authentication has become a critical step to gain access to services such as on-line banking, e-commerce, transport systems and cars (contact-less keys). In several cases, however, the authentication process has to be performed under challenging conditions. READ MORE

  4. 4. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings

    Author : Elena Pagnin; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Homomorphic Signatures; Server-Aided Verification; Distance-Bounding Authentication Protocols; Verifiable Com- putation; Biometric Authentication.;

    Abstract : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. READ MORE

  5. 5. Stochastic Modeling for Video Object Tracking and Online Learning: manifolds and particle filters

    Author : Zulfiqar Hasan Khan; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; anisotropic mean shift; online learning of reference object; covariance tracking; consensus point feature correspondences; Bayesian tracking; Gabor features; Visual object tracking; Grassmann manifold.; Riemannian manifold; particle filters;

    Abstract : Classical visual object tracking techniques provide effective methods when parameters of the underlying process lie in a vector space. However, various parameter spaces commonly occurring in visual tracking violate this assumption. READ MORE