Sciweavers

339 search results - page 55 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
SCALESPACE
1999
Springer
15 years 4 months ago
Morphing Active Contours
ÐA method for deforming curves in a given image to a desired position in a second image is introduced in this paper. The algorithm is based on deforming the first image toward the...
Marcelo Bertalmío, Guillermo Sapiro, Gregor...
JSAC
2008
79views more  JSAC 2008»
14 years 11 months ago
A content-centric framework for effective data dissemination in opportunistic networks
In this paper, we address the challenges of content transfer in opportunistic networks, and propose techniques to better facilitate data dissemination based on the characteristics ...
Ling-Jyh Chen, Chen-Hung Yu, Cheng-Long Tseng, Hao...
IWSEC
2009
Springer
15 years 6 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
DAC
2007
ACM
16 years 21 days ago
Implicitly Parallel Programming Models for Thousand-Core Microprocessors
This paper argues for an implicitly parallel programming model for many-core microprocessors, and provides initial technical approaches towards this goal. In an implicitly paralle...
Wen-mei W. Hwu, Shane Ryoo, Sain-Zee Ueng, John H....
SC
1995
ACM
15 years 3 months ago
Input/Output Characteristics of Scalable Parallel Applications
Rapid increases in computing and communication performance are exacerbating the long-standing problem of performance-limited input/output. Indeed, for many otherwise scalable para...
Phyllis Crandall, Ruth A. Aydt, Andrew A. Chien, D...