Sciweavers

1565 search results - page 68 / 313
» An unlikely result
Sort
View
DSD
2010
IEEE
171views Hardware» more  DSD 2010»
14 years 10 months ago
Test Patterns Compression Technique Based on a Dedicated SAT-Based ATPG
— In this paper we propose a new method of test patterns compression based on a design of a dedicated SAT-based ATPG (Automatic Test Pattern Generator). This compression method i...
Jiri Balcarek, Petr Fiser, Jan Schmidt
ICASSP
2010
IEEE
14 years 10 months ago
Bayesian compressive sensing for phonetic classification
In this paper, we introduce a novel bayesian compressive sensing (CS) technique for phonetic classification. CS is often used to characterize a signal from a few support training...
Tara N. Sainath, Avishy Carmi, Dimitri Kanevsky, B...
IPL
2010
93views more  IPL 2010»
14 years 10 months ago
Compiling and securing cryptographic protocols
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequence...
Yannick Chevalier, Michaël Rusinowitch
TCOM
2010
72views more  TCOM 2010»
14 years 10 months ago
Iterative Multisymbol Noncoherent Reception of Coded CPFSK
—A multisymbol noncoherent receiver suitable for coded continuous-phase frequency-shift keying is developed and analyzed. Unlike coherently detected signals, the modulation index...
Matthew C. Valenti, Shi Cheng, Don J. Torrieri
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
14 years 10 months ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson