Sciweavers

2056 search results - page 270 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
75
Voted
DRM
2007
Springer
15 years 4 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
141
Voted
EDO
2006
Springer
15 years 1 months ago
An extensible, lightweight architecture for adaptive J2EE applications
Server applications with adaptive behaviors can adapt their functionality in response to environmental changes, and significantly reduce the on-going costs of system deployment an...
Ian Gorton, Yan Liu, Nihar Trivedi
106
Voted
GECCO
2004
Springer
145views Optimization» more  GECCO 2004»
15 years 3 months ago
Search Based Automatic Test-Data Generation at an Architectural Level
Abstract. The need for effective testing techniques for architectural level descriptions is widely recognised. However, due to the variety of domain-specific architectural descript...
Yuan Zhan, John A. Clark
77
Voted
EUROMICRO
2003
IEEE
15 years 3 months ago
A Web-Based Isosurface Extraction System for Heterogeneous Clients
We present a practical approach to the design of a Web system for 3D and volumetric data interrogation and visualization. This Web application provides different functionalities i...
Andrea Clematis, Daniele D'Agostino, Walter De Mar...
DAC
1996
ACM
15 years 2 months ago
Power Estimation of Cell-Based CMOS Circuits
PPP is a Web-based simulation and synthesis environment for low-power design. In this paper we describe the gate-level simulation engine of PPP, that achieves accuracy always with...
Alessandro Bogliolo, Luca Benini, Bruno Ricc&ograv...