Sciweavers

188 search results - page 18 / 38
» Developing a Hardware Evaluation Method for SHA-3 Candidates
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 5 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
IJCV
2010
261views more  IJCV 2010»
14 years 10 months ago
HumanEva: Synchronized Video and Motion Capture Dataset and Baseline Algorithm for Evaluation of Articulated Human Motion
While research on articulated human motion and pose estimation has progressed rapidly in the last few years, there has been no systematic quantitative evaluation of competing meth...
Leonid Sigal, Alexandru O. Balan, Michael J. Black
SIGMETRICS
2010
ACM
103views Hardware» more  SIGMETRICS 2010»
14 years 6 months ago
VM power metering: feasibility and challenges
This paper explores the feasibility of and challenges in developing methods for black-box monitoring of a VM's power usage at runtime, on shared virtualized compute platforms...
Bhavani Krishnan, Hrishikesh Amur, Ada Gavrilovska...
ASPDAC
2012
ACM
265views Hardware» more  ASPDAC 2012»
13 years 7 months ago
Improving validation coverage metrics to account for limited observability
—In both pre-silicon and post-silicon validation, the detection of design errors requires both stimulus capable of activating the errors and checkers capable of detecting the beh...
Peter Lisherness, Kwang-Ting Cheng
ECMDAFA
2006
Springer
142views Hardware» more  ECMDAFA 2006»
15 years 3 months ago
Constraint Support in MDA Tools: A Survey
: The growing interest in the MDA (Model-Driven Architecture) and MDD (Model-Driven Development) approaches has largely increased the number of tools and methods including code-gen...
Jordi Cabot, Ernest Teniente