Sciweavers

188 search results - page 28 / 38
» Developing a Hardware Evaluation Method for SHA-3 Candidates
Sort
View
ICRA
2007
IEEE
160views Robotics» more  ICRA 2007»
15 years 6 months ago
OOPS for Motion Planning: An Online, Open-source, Programming System
— The success of sampling-based motion planners has resulted in a plethora of methods for improving planning components, such as sampling and connection strategies, local planner...
Erion Plaku, Kostas E. Bekris, Lydia E. Kavraki
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
15 years 4 months ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
ECBS
2006
IEEE
145views Hardware» more  ECBS 2006»
15 years 3 months ago
The Accuracy of Fault Prediction in Modified Code - Statistical Model vs. Expert Estimation
Fault prediction models still seem to be more popular in academia than in industry. In industry expert estimations of fault proneness are the most popular methods of deciding wher...
Piotr Tomaszewski, Jim Håkansson, Lars Lundb...
ATC
2008
Springer
15 years 1 months ago
Concepts for Autonomous Control Flow Checking for Embedded CPUs
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Daniel Ziener, Jürgen Teich
BMCBI
2010
102views more  BMCBI 2010»
14 years 11 months ago
Peptide binding predictions for HLA DR, DP and DQ molecules
Background: MHC class II binding predictions are widely used to identify epitope candidates in infectious agents, allergens, cancer and autoantigens. The vast majority of predicti...
Peng Wang, John Sidney, Yohan Kim, Alessandro Sett...