Sciweavers

339 search results - page 60 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
108
Voted
PDPTA
2007
15 years 1 months ago
Multiple Networks for Heterogeneous Distributed Applications
Abstract - We have experienced in our distributed applications that the network is the main limiting factor for performances on clusters. Indeed clusters are cheap and it is easier...
Sylvain Jubertie, Emmanuel Melin
SIGSOFT
2004
ACM
15 years 5 months ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...
MMSP
2008
IEEE
147views Multimedia» more  MMSP 2008»
15 years 6 months ago
Bit allocation for spatial scalability in H.264/SVC
Abstract—We propose a model-based spatial layer bit allocation algorithm for H.264/SVC in this work. The spatial scalability of H.264/SVC is achieved by a multi-layer approach, w...
Jiaying Liu, Yongjin Cho, Zongming Guo, C. C. Jay ...
102
Voted
SICHERHEIT
2008
15 years 1 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
TWC
2008
158views more  TWC 2008»
14 years 11 months ago
Transmission capacity of ad hoc networks with spatial diversity
This paper derives the outage probability and transmission capacity of ad hoc wireless networks with nodes employing multiple antenna diversity techniques, for a general class of ...
Andrew M. Hunter, Jeffrey G. Andrews, Steven Weber