Sciweavers

32545 search results - page 6396 / 6509
» Data Structures and Algorithms
Sort
View
DAC
2007
ACM
16 years 8 days ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
DAC
2003
ACM
16 years 7 days ago
On-chip logic minimization
While Boolean logic minimization is typically used in logic synthesis, logic minimization can be useful in numerous other applications. However, many of those applications, such a...
Roman L. Lysecky, Frank Vahid
DAC
2004
ACM
16 years 7 days ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
DAC
2006
ACM
16 years 7 days ago
Efficient simulation of critical synchronous dataflow graphs
Simulation and verification using electronic design automation (EDA) tools are key steps in the design process for communication and signal processing systems. The synchronous dat...
Chia-Jui Hsu, José Luis Pino, Ming-Yung Ko,...
MICCAI
2002
Springer
16 years 4 days ago
Atlas-Based Segmentation and Tracking of 3D Cardiac MR Images Using Non-rigid Registration
We propose a novel method for fully automated segmentation and tracking of the myocardium and left and right ventricles (LV and RV) using 4D MR images. The method uses non-rigid re...
Daniel Rueckert, Gerardo I. Sanchez-Ortiz, Maria L...
« Prev « First page 6396 / 6509 Last » Next »