Sciweavers

1532 search results - page 140 / 307
» A Comparison of RESTART Implementations
Sort
View
126
Voted
WCRE
2005
IEEE
15 years 9 months ago
Toward an Infrastructure to Support Interoperability in Reverse Engineering
In this paper we present an infrastructure that supports interoperability among various reverse engineering tools and applications. We include an Application Programmer’s Interf...
Nicholas A. Kraft, Brian A. Malloy, James F. Power
SBCCI
2005
ACM
132views VLSI» more  SBCCI 2005»
15 years 9 months ago
Design and power optimization of CMOS RF blocks operating in the moderate inversion region
In this work the design of radiofrequency CMOS circuit blocks in the 910MHz ISM band, while biasing the MOS transistor in the moderate inversion region, is analyzed. An amplifier ...
Leonardo Barboni, Rafaella Fiorelli
133
Voted
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler
120
Voted
EDCC
2005
Springer
15 years 9 months ago
Performance Evaluation of Consistent Recovery Protocols Using MPICH-GF
This paper presents an implementation of several consistent protocols at the abstract device level and their performance comparison. We have performed experiments using three NAS P...
Namyoon Woo, Hyungsoo Jung, Dongin Shin, Hyuck Han...
122
Voted
ISMIR
2005
Springer
138views Music» more  ISMIR 2005»
15 years 9 months ago
Efficient Melody Retrieval with Motif Contour Classes
This paper describes the use of motif contour classes for efficient retrieval of melodies from music collections. Instead of extracting incipits or themes, complete monophonic pi...
Tillman Weyde, Christian Datzko