Sciweavers

139 search results - page 26 / 28
» Shape Derivative of Drag Functional
Sort
View
ICFEM
2010
Springer
13 years 4 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...
ICASSP
2011
IEEE
12 years 9 months ago
One sentence voice adaptation using GMM-based frequency-warping and shift with a sub-band basis spectrum model
This paper presents a rapid voice adaptation algorithm using GMM-based frequency warping and shift with parameters of a subband basis spectrum model (SBM)[1]. The SBM parameter re...
Masatsune Tamura, Masahiro Morita, Takehiko Kagosh...
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
12 years 5 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
ETVC
2008
13 years 7 months ago
Statistical Computing on Manifolds: From Riemannian Geometry to Computational Anatomy
Computational anatomy is an emerging discipline that aims at analyzing and modeling the individual anatomy of organs and their biological variability across a population. The goal ...
Xavier Pennec
BMCBI
2008
123views more  BMCBI 2008»
13 years 5 months ago
PocketMatch: A new algorithm to compare binding sites in protein structures
Background: Recognizing similarities and deriving relationships among protein molecules is a fundamental requirement in present-day biology. Similarities can be present at various...
Kalidas Yeturu, Nagasuma Chandra