Sciweavers

1518 search results - page 88 / 304
» Cryptographic Test Correction
Sort
View
TIFS
2008
120views more  TIFS 2008»
15 years 16 days ago
Determining Image Origin and Integrity Using Sensor Noise
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformit...
Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan...
96
Voted
CVPR
2003
IEEE
16 years 2 months ago
Learning a discriminative classifier using shape context distances
For purpose of object recognition, we learn one discriminative classifier based on one prototype, using shape context distances as the feature vector. From multiple prototypes, th...
Hao Zhang 0003, Jitendra Malik
85
Voted
ATS
2002
IEEE
95views Hardware» more  ATS 2002»
15 years 5 months ago
Effective Error Diagnosis for RTL Designs in HDLs
We propose an effective approach to diagnose multiple design errors in HDL designs with only one erroneous test case. Error candidates will be greatly reduced while ensuring that ...
Tai-Ying Jiang, Chien-Nan Jimmy Liu, Jing-Yang Jou
73
Voted
SAC
2008
ACM
15 years 3 days ago
Extending peer-to-peer networks for approximate search
This paper proposes a way to enable approximate queries in a peer-to-peer network by using a special encoding function and error correcting codes. The encoding function maintains ...
Alain Mowat, Roman Schmidt, Michael Schumacher, Io...
BIRTHDAY
2012
Springer
13 years 8 months ago
The Logical Execution Time Paradigm
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
Christoph M. Kirsch, Ana Sokolova