Sciweavers

313 search results - page 44 / 63
» Error Correction Based on Verification Techniques
Sort
View
75
Voted
DATE
2007
IEEE
91views Hardware» more  DATE 2007»
15 years 4 months ago
Transient fault prediction based on anomalies in processor events
Future microprocessors will be highly susceptible to transient errors as the sizes of transistors decrease due to CMOS scaling. Prior techniques advocated full scale structural or...
Satish Narayanasamy, Ayse Kivilcim Coskun, Brad Ca...
DICTA
2007
14 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
ICMCS
2009
IEEE
134views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Robust lossless data hiding based on block gravity center for selective authentication
Reversible or lossless data hiding enables host media to be restored from marked media without any loss of host information. However, since most of existing lossless data hiding m...
Kyung-Su Kim, Min-Jeong Lee, Young-Ho Suh, Heung-K...
CLIN
2001
14 years 11 months ago
Memory-Based Phoneme-to-Grapheme Conversion
In this paper, we describe a method to enhance the readability of out-of-vocabulary items (OOVs) in the textual output in a large vocabulary continuous speech recognition system. ...
Bart Decadt, Jacques Duchateau, Walter Daelemans, ...
87
Voted
JCP
2006
151views more  JCP 2006»
14 years 9 months ago
Simulated Annealing based Wireless Sensor Network Localization
In this paper, we describe a novel localization algorithm for ad hoc wireless sensor networks. Accurate selforganization and localization capability is a highly desirable character...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic