Sciweavers

837 search results - page 35 / 168
» Hard combinators
Sort
View
81
Voted
HICSS
2002
IEEE
92views Biometrics» more  HICSS 2002»
15 years 3 months ago
A Tentative Framework for Managing Software Product Development in Small Companies
Deploying an appropriate software process can improve the effectiveness of software engineering. Still, small companies find it hard to allocate resources to software process impr...
Kristian Rautiainen, Casper Lassenius, Jarno V&aum...
ACNS
2010
Springer
150views Cryptology» more  ACNS 2010»
15 years 3 months ago
Regulatory Compliant Oblivious RAM
Abstract. We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data re...
Bogdan Carbunar, Radu Sion
DATE
2009
IEEE
107views Hardware» more  DATE 2009»
15 years 2 months ago
Sequential logic rectifications with approximate SPFDs
In the digital VLSI cycle, logic transformations are often required to modify the design to meet different synthesis and optimization goals. Logic transformations on sequential ci...
Yu-Shen Yang, Subarna Sinha, Andreas G. Veneris, R...
FPGA
2006
ACM
93views FPGA» more  FPGA 2006»
15 years 1 months ago
Measuring the gap between FPGAs and ASICs
This paper presents experimental measurements of the differences between a 90nm CMOS FPGA and 90nm CMOS Standard Cell ASICs in terms of logic density, circuit speed and power cons...
Ian Kuon, Jonathan Rose
76
Voted
VISUAL
2000
Springer
15 years 1 months ago
Chinese Cursive Script Character Image Retrieval Based on an Integrated Probability Function
Abstract. Often in content-based image retrieval, a single image attribute may not have enough discriminative information for retrieval. On the other hand, when multiple features a...
Irwin King, Zhong Jin, David Yuk-Ming Chan