Sciweavers

331 search results - page 36 / 67
» Limits on Multiple Instruction Issue
Sort
View
IEEESP
2006
130views more  IEEESP 2006»
14 years 10 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
IEEEARES
2006
IEEE
15 years 4 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett
TIFS
2010
137views more  TIFS 2010»
14 years 4 months ago
On the dynamic selection of biometric fusion algorithms
Biometric fusion consolidates the output of multiple biometric classifiers to render a decision about the identity of an individual. We consider the problem of designing a fusion s...
Mayank Vatsa, Richa Singh, Afzel Noore, Arun Ross
SIGSOFT
2007
ACM
15 years 10 months ago
Towards incremental adaptive covering arrays
The increasing complexity of configurable software systems creates a need for more intelligent sampling mechanisms to detect and locate failure-inducing dependencies between confi...
Adam A. Porter, Myra B. Cohen, Sandro Fouché...
TIT
1998
105views more  TIT 1998»
14 years 9 months ago
Diversity Waveform Sets for Delay-Doppler Imaging
Abstract— Properties of the ambiguity function and the uncertainty relation of Fourier transforms assert fundamental limitations on the ability of any single radar waveform of co...
Jiann-Ching Guey, Mark R. Bell