Sciweavers

1660 search results - page 199 / 332
» Abstract Application Modeling for System Design Space Explor...
Sort
View
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
15 years 4 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
RSP
2005
IEEE
164views Control Systems» more  RSP 2005»
15 years 10 months ago
High Level Synthesis for Data-Driven Applications
Abstract— John von Neumann proposed his famous architecture in a context where hardware was very expensive and bulky. His goal was to maximize functionality with minimal hardware...
Etienne Bergeron, Xavier Saint-Mleux, Marc Feeley,...
ICDM
2008
IEEE
106views Data Mining» more  ICDM 2008»
15 years 11 months ago
Boosting Relational Sequence Alignments
The task of aligning sequences arises in many applications. Classical dynamic programming approaches require the explicit state enumeration in the reward model. This is often impr...
Andreas Karwath, Kristian Kersting, Niels Landwehr
143
Voted
BMCBI
2008
106views more  BMCBI 2008»
15 years 4 months ago
Ontology Design Patterns for bio-ontologies: a case study on the Cell Cycle Ontology
Background: Bio-ontologies are key elements of knowledge management in bioinformatics. Rich and rigorous bio-ontologies should represent biological knowledge with high fidelity an...
Mikel Egaña Aranguren, Erick Antezana, Mart...
139
Voted
ACSW
2006
15 years 6 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...