Sciweavers

851 search results - page 42 / 171
» History Effects and Verification
Sort
View
ICCAD
2005
IEEE
160views Hardware» more  ICCAD 2005»
15 years 8 months ago
Equivalence verification of polynomial datapaths with fixed-size bit-vectors using finite ring algebra
— This paper addresses the problem of equivalence verification of RTL descriptions. The focus is on datapathoriented designs that implement polynomial computations over fixed-s...
Namrata Shekhar, Priyank Kalla, Florian Enescu, Si...
ICASSP
2009
IEEE
15 years 6 months ago
Support vector machines and Joint Factor Analysis for speaker verification
This article presents several techniques to combine between Support vector machines (SVM) and Joint Factor Analysis (JFA) model for speaker verification. In this combination, the...
Najim Dehak, Patrick Kenny, Réda Dehak, Ond...
ICDAR
2003
IEEE
15 years 5 months ago
Document Identity, Authentication and Ownership: The Future of Biometric Verification
Document security is an increasingly important element in the multi-faceted discipline of document processing, and authentication of individual identity will play an increasingly ...
Michael C. Fairhurst
ISPD
1998
ACM
111views Hardware» more  ISPD 1998»
15 years 4 months ago
A pattern matching algorithm for verification and analysis of very large IC layouts
We propose a simple, isometry invariant pattern matching algorithm for an effective data reduction useful in layout-related data processing of very complex IC designs. The repeata...
Mariusz Niewczas, Wojciech Maly, Andrzej J. Strojw...
RTCSA
1997
IEEE
15 years 4 months ago
Behavior verification of hybrid real-time requirements by qualitative formalism
Although modern control theories have been successfully applied to solve a variety of problems, they are often mathematically and physically too specific to describe and analyze t...
Jang-Soo Lee, Sung Deok Cha