Sciweavers

415 search results - page 23 / 83
» Intruders pattern identification
Sort
View
HPCA
2002
IEEE
15 years 10 months ago
Quantifying Load Stream Behavior
The increasing performance gap between processors and memory will force future architectures to devote significant resources towards removing and hiding memory latency. The two ma...
Suleyman Sair, Timothy Sherwood, Brad Calder
ITC
2003
IEEE
125views Hardware» more  ITC 2003»
15 years 3 months ago
Progressive Bridge Identification
We present an efficient algorithm for identification of two-line bridges in combinational CMOS logic that narrows down the two-line bridge candidates based on tester responses for...
Thomas J. Vogels, Wojciech Maly, R. D. (Shawn) Bla...
PR
2006
125views more  PR 2006»
14 years 9 months ago
Palmprint identification using feature-level fusion
In this paper, we propose a feature-level fusion approach for improving the efficiency of palmprint identification. Multiple elliptical Gabor filters with different orientations a...
Adams Wai-Kin Kong, David Zhang, Mohamed Kamel
TIFS
2008
123views more  TIFS 2008»
14 years 9 months ago
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
Abstract--Digital single lens reflex cameras suffer from a wellknown sensor dust problem due to interchangeable lenses that they deploy. The dust particles that settle in front of ...
Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon
DSD
2007
IEEE
83views Hardware» more  DSD 2007»
15 years 4 months ago
Hierarchical Identification of Untestable Faults in Sequential Circuits
Similar to sequential test pattern generation, the problem of identifying untestable faults in sequential circuits remains unsolved. Most of the previous works in untestability id...
Jaan Raik, Raimund Ubar, Anna Krivenko, Margus Kru...