Sciweavers

6059 search results - page 65 / 1212
» A Technique for Verifying Measurements
Sort
View
AVBPA
2003
Springer
184views Biometrics» more  AVBPA 2003»
15 years 3 months ago
Biometric Template Selection: A Case Study in Fingerprints
Abstract. A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a ...
Anil K. Jain, Umut Uludag, Arun Ross
ICCAD
1994
IEEE
95views Hardware» more  ICCAD 1994»
15 years 2 months ago
Provably correct high-level timing analysis without path sensitization
- This paper addresses the problem of true delay estimation during high level design. The existing delay estimation techniques either estimate the topological delay of the circuit ...
Subhrajit Bhattacharya, Sujit Dey, Franc Brglez
EDOC
2007
IEEE
15 years 2 months ago
Automated Model-Based Configuration of Enterprise Java Applications
The decentralized process of configuring enterprise applications is complex and error-prone, involving multiple participants/roles and numerous configuration changes across multipl...
Jules White, Douglas C. Schmidt, Krzysztof Czarnec...
CNSR
2005
IEEE
15 years 7 hour ago
An Integrated Error Control and Constrained Sequence Code Based on Multimode Coding
We present a method of integrating constrained sequence (CS) and error control (EC) codes for digital communication systems. This technique is based on multimode coding where a si...
A. Hughes, I. J. Fair
EMSOFT
2008
Springer
14 years 11 months ago
Symbolic analysis for improving simulation coverage of Simulink/Stateflow models
Aimed at verifying safety properties and improving simulation coverage for hybrid systems models of embedded control software, we propose a technique that combines numerical simul...
Rajeev Alur, Aditya Kanade, S. Ramesh, K. C. Shash...