Sciweavers

297 search results - page 41 / 60
» Paternity analysis in Excel
Sort
View
ICIAR
2004
Springer
15 years 7 months ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
124
Voted
DATE
2003
IEEE
128views Hardware» more  DATE 2003»
15 years 7 months ago
Flexible and Formal Modeling of Microprocessors with Application to Retargetable Simulation
Given the growth in application-specific processors, there is a strong need for a retargetable modeling framework that is capable of accurately capturing complex processor behavi...
Wei Qin, Sharad Malik
INFOCOM
2003
IEEE
15 years 7 months ago
Asymptotic Insensitivity of Least-Recently-Used Caching to Statistical Dependency
Abstract— We investigate a widely popular Least-RecentlyUsed (LRU) cache replacement algorithm with semi-Markov modulated requests. Semi-Markov processes provide the flexibility...
Predrag R. Jelenkovic, Ana Radovanovic
111
Voted
ISCAS
2003
IEEE
103views Hardware» more  ISCAS 2003»
15 years 7 months ago
Low-noise biasing of voltage-controlled oscillators by means of resonant inductive degeneration
Many of the existing theories on phase-noise generation in oscillators are concerned with the noise originating from the active part and the resonator, while the contribution of t...
Aleksandar Tasic, Wouter A. Serdijn, John R. Long
126
Voted
DOCENG
2003
ACM
15 years 7 months ago
Lazy XSL transformations
We introduce a lazy XSLT interpreter that provides random access to the transformation result. This allows efficient pipelining of transformation sequences. Nodes of the result tr...
Steffen Schott, Markus L. Noga