Sciweavers

3456 search results - page 586 / 692
» Byte Code Engineering
Sort
View
114
Voted
DFT
2009
IEEE
189views VLSI» more  DFT 2009»
15 years 9 months ago
Analyzing Formal Verification and Testing Efforts of Different Fault Tolerance Mechanisms
Pre-fabrication design verification and post-fabrication chip testing are two important stages in the product realization process. These two stages consume a large part of resourc...
Meng Zhang, Anita Lungu, Daniel J. Sorin
126
Voted
WIAMIS
2009
IEEE
15 years 9 months ago
Feature-based video key frame extraction for low quality video sequences
We present an approach to key frame extraction for structuring user generated videos on video sharing websites (e. g. YouTube). Our approach is intended to link existing image sea...
Pascal Kelm, Sebastian Schmiedeke, Thomas Sikora
123
Voted
IPPS
2009
IEEE
15 years 9 months ago
Predictive analysis and optimisation of pipelined wavefront computations
Pipelined wavefront computations are a ubiquitous class of parallel algorithm used for the solution of a num­ ber of scientific and engineering applications. This paper investig...
Gihan R. Mudalige, Simon D. Hammond, J. A. Smith, ...
119
Voted
IPPS
2009
IEEE
15 years 9 months ago
Toward adjoinable MPI
4 Automatic differentiation is the primary means of obtaining analytic5 derivatives from a numerical model given as a computer program. There-6 fore, it is an essential productivi...
Jean Utke, Laurent Hascoët, Patrick Heimbach,...
104
Voted
FC
2009
Springer
109views Cryptology» more  FC 2009»
15 years 9 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson