Sciweavers

2018 search results - page 219 / 404
» Code Normal Forms
Sort
View
CASES
2005
ACM
15 years 4 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
BC
1998
94views more  BC 1998»
15 years 2 months ago
A neural network study of precollicular saccadic averaging
Saccadic averaging is the phenomenon that two simultaneously presented retinal inputs result in a saccade with an endpoint located on an intermediate position between the two stimu...
Karin P. Krommenhoek, W. A. J. J. Wiegerinck
VLSISP
2010
140views more  VLSISP 2010»
15 years 22 days ago
A Split-Decoding Message Passing Algorithm for Low Density Parity Check Decoders
A Split decoding algorithm is proposed which divides each row of the parity check matrix into two or multiple nearly-independent simplified partitions. The proposed method signific...
Tinoosh Mohsenin, Bevan M. Baas
123
Voted
ICCV
2005
IEEE
16 years 4 months ago
Structured Light in Scattering Media
Virtually all structured light methods assume that the scene and the sources are immersed in pure air and that light is neither scattered nor absorbed. Recently, however, structur...
Srinivasa G. Narasimhan, Shree K. Nayar, Bo Sun, S...
130
Voted
CISIS
2010
IEEE
15 years 9 months ago
Computational Grid as an Appropriate Infrastructure for Ultra Large Scale Software Intensive Systems
—Ultra large scale (ULS) systems are future software intensive systems that have billions of lines of code, composed of heterogeneous, changing, inconsistent and independent elem...
Babak Rezaei Rad, Fereidoon Shams Aliee