Sciweavers

40 search results - page 7 / 8
» Palmprint Verification with Moments
Sort
View
FAC
2010
107views more  FAC 2010»
13 years 2 months ago
Atomic actions, and their refinements to isolated protocols
Inspired by the properties of the refinement development of the Mondex Electronic Purse, we view an isolated atomic action as a family of transitions with a common before-state, an...
Richard Banach, Gerhard Schellhorn
ICIP
2006
IEEE
14 years 7 months ago
Robust Signature-Based Geometric Invariant Copyright Protection
The most significant bit (MSB)-plane of an image is least likely to change by the most signal processing operations. Watermarking techniques are, however, unable to exploit the MS...
Mohammad Awrangjeb, M. Manzur Murshed
ICSE
2007
IEEE-ACM
14 years 5 months ago
Predicting Faults from Cached History
We analyze the version history of 7 software systems to predict the most fault prone entities and files. The basic assumption is that faults do not occur in isolation, but rather ...
Sunghun Kim, Thomas Zimmermann, E. James Whitehead...
DAC
2003
ACM
13 years 10 months ago
Realizable RLCK circuit crunching
Reduction of an extracted netlist is an important pre-processing step for techniques such as model order reduction in the design and analysis of VLSI circuits. This paper describe...
Chirayu S. Amin, Masud H. Chowdhury, Yehea I. Isma...
EWSA
2006
Springer
13 years 9 months ago
Modes for Software Architectures
Abstract. Modern systems are heterogeneous, geographically distributed and highly dynamic since the communication topology can vary and the components can, at any moment, connect t...
Dan Hirsch, Jeff Kramer, Jeff Magee, Sebasti&aacut...