Sciweavers

222 search results - page 35 / 45
» Efficient assertion based verification using TLM
Sort
View
SICHERHEIT
2008
15 years 1 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
DATE
2002
IEEE
95views Hardware» more  DATE 2002»
15 years 4 months ago
Window-Based Susceptance Models for Large-Scale RLC Circuit Analyses
Due to the increasing operating frequencies and the manner in which the corresponding integrated circuits and systems must be designed, the extraction, modeling and simulation of ...
Hui Zheng, Lawrence T. Pileggi, Michael W. Beattie...
ECCV
2004
Springer
16 years 1 months ago
Matching Tensors for Automatic Correspondence and Registration
Abstract. Complete 3-D modeling of a free-form object requires acquisition from multiple view-points. These views are then required to be registered in a common coordinate system b...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens
DAC
2006
ACM
16 years 25 days ago
SAT sweeping with local observability don't-cares
SAT sweeping is a method for simplifying an AND/INVERTER graph (AIG) by systematically merging graph vertices from the inputs towards the outputs using a combination of structural...
Qi Zhu, Nathan Kitchen, Andreas Kuehlmann, Alberto...
TVLSI
2008
107views more  TVLSI 2008»
14 years 11 months ago
Novel Probabilistic Combinational Equivalence Checking
Exact approaches to combinational equivalence checking, such as automatic test pattern generation-based, binary decision diagrams (BDD)-based, satisfiability-based, and hybrid appr...
Shih-Chieh Wu, Chun-Yao Wang, Yung-Chih Chen