Abstract. In this paper, we propose an efficient video coding system that applies statistical learning methods to reduce the computational cost in H.264 encoder. The proposed metho...
Modular inverse computation is needed in several public key cryptographic applications. In this work, we present two VLSI hardware implementations used in the calculation of Montg...
Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, &Ccedi...
In this paper a novel approach for broadband feedback active noise control (ANC) is presented which is based on the combination of classical non-adaptive feedback and adaptive fee...
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Equality logic with or without uninterpreted functions is used for proving the equivalence or refinement between systems (hardware verification, compiler’s translation, etc). C...