Sciweavers

2501 search results - page 348 / 501
» Logics with Rank Operators
Sort
View
125
Voted
DSD
2008
IEEE
136views Hardware» more  DSD 2008»
15 years 11 months ago
Network Interface Sharing Techniques for Area Optimized NoC Architectures
Although preliminary analysis frameworks point out the performance speed-ups achievable by on-chip networks with respect to state-of-the-art interconnects, the area concern remain...
Alberto Ferrante, Simone Medardoni, Davide Bertozz...
101
Voted
ICPR
2008
IEEE
15 years 11 months ago
A cryptosystem based on palmprint feature
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the tradition...
Xiangqian Wu, Kuanquan Wang, David Zhang
WCRE
2008
IEEE
15 years 11 months ago
A Business Process Explorer: Recovering Business Processes from Business Applications
A business process contains a set of logically related tasks executed to fulfill business goals. Business applications enable organizations to automatically perform their daily op...
Jin Guo, Ying Zou
DDECS
2007
IEEE
143views Hardware» more  DDECS 2007»
15 years 11 months ago
An Experimental Analysis of SEU Sensitiveness on System Knowledge-based Hardening Techniques
Logic Soft Errors caused by radiation are a major concern when working with circuits that need to operate in harsh environments, such as space or avionics applications, where soft ...
Oscar Ruano, Pilar Reyes, Juan Antonio Maestro, Lu...
FUZZIEEE
2007
IEEE
15 years 11 months ago
Consistency of Reciprocal Preference Relations
— The consistency of reciprocal preference relations is studied. Consistency is related with rationality, which is associated with the transitivity property. For fuzzy preference...
Francisco Chiclana, Enrique Herrera-Viedma, Sergio...