Sciweavers

851 search results - page 43 / 171
» History Effects and Verification
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 3 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
ASPDAC
2010
ACM
135views Hardware» more  ASPDAC 2010»
14 years 10 months ago
Statistical timing verification for transparently latched circuits through structural graph traversal
Level-sensitive transparent latches are widely used in high-performance sequential circuit designs. Under process variations, the timing of a transparently latched circuit will ada...
Xingliang Yuan, Jia Wang
RV
2010
Springer
153views Hardware» more  RV 2010»
14 years 9 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho
ICASSP
2011
IEEE
14 years 3 months ago
A robust feature extraction algorithm based on class-Modular Image Principal Component Analysis for face verification
Face verification systems reach good performance on ideal environmental conditions. Conversely, they are very sensitive to non-controlled environments. This work proposes the cla...
Jose Francisco Pereira, Rafael M. Barreto, George ...
ICASSP
2011
IEEE
14 years 3 months ago
A channel-blind system for speaker verification
The majority of speaker verification systems proposed in the NIST speaker recognition evaluation are conditioned on the type of data to be processed: telephone or microphone. In ...
Najim Dehak, Zahi N. Karam, Douglas A. Reynolds, R...