Sciweavers

2421 search results - page 211 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
DATE
2003
IEEE
108views Hardware» more  DATE 2003»
15 years 9 months ago
Generalized Posynomial Performance Modeling
This paper presents a new method to automatically generate posynomial symbolic expressions for the performance characteristics of analog integrated circuits. The coefficient set ...
Tom Eeckelaert, Walter Daems, Georges G. E. Gielen...
ISJGP
2010
15 years 1 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
141
Voted
WACV
2007
IEEE
15 years 10 months ago
Warped Document Image Restoration Using Shape-from-Shading and Physically-Based Modeling
With the pervasive use of handheld digital devices such as camera phones and PDAs, people have started to capture images as a way of recording information. However, due to the non...
Li Zhang, Chew Lim Tan
131
Voted
ESORICS
2006
Springer
15 years 7 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
118
Voted
IROS
2009
IEEE
139views Robotics» more  IROS 2009»
15 years 10 months ago
On the use of 2D navigable maps for enhancing ground vehicle localization
Abstract— For ground vehicle localization, hybrid-GNSS localizers now use commonly dead-reckoning sensors, like odometers or inertial units. They are designed to increase the acc...
Clément Fouque, Philippe Bonnifait