Sciweavers

7978 search results - page 1285 / 1596
» Combining shared-coin algorithms
Sort
View
137
Voted
AINA
2003
IEEE
15 years 10 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
AMFG
2003
IEEE
203views Biometrics» more  AMFG 2003»
15 years 10 months ago
Illumination Normalization for Robust Face Recognition Against Varying Lighting Conditions
Evaluations of the state-of-the-art of both academic face recognition algorithms and commercial systems have shown that recognition performance of most current technologies degrad...
Shiguang Shan, Wen Gao, Bo Cao, Debin Zhao
117
Voted
CODES
2003
IEEE
15 years 10 months ago
Tracking object life cycle for leakage energy optimization
The focus of this work is on utilizing the state of objects during their lifespan in optimizing the leakage energy consumed in the data caches when executing embedded Java applica...
Guangyu Chen, Narayanan Vijaykrishnan, Mahmut T. K...
DATE
2003
IEEE
124views Hardware» more  DATE 2003»
15 years 10 months ago
Hierarchical Global Floorplacement Using Simulated Annealing and Network Flow Area Migration
– Floorplanning large designs with many hard macros and IP blocks of various sizes is becoming an increasingly important and challenging problem. This paper presents a global flo...
Wonjoon Choi, Kia Bazargan
DFT
2003
IEEE
64views VLSI» more  DFT 2003»
15 years 10 months ago
Hybrid BIST Time Minimization for Core-Based Systems with STUMPS Architecture
1 This paper presents a solution to the test time minimization problem for core-based systems that contain sequential cores with STUMPS architecture. We assume a hybrid BIST approa...
Gert Jervan, Petru Eles, Zebo Peng, Raimund Ubar, ...
« Prev « First page 1285 / 1596 Last » Next »