Sciweavers

2449 search results - page 268 / 490
» Tensor Embedding Methods
Sort
View
DATE
2003
IEEE
130views Hardware» more  DATE 2003»
15 years 4 months ago
A Technique for High Ratio LZW Compression
Reduction of both the test suite size and the download time of test vectors is important in today's System-On-a-Chip designs. In this paper, a method for compressing the scan...
Michael J. Knieser, Francis G. Wolff, Christos A. ...
IH
1999
Springer
15 years 3 months ago
Recovery of Watermarks from Distorted Images
Many techniques for watermarking of digital images have appeared in numerous publications. Most of these techniques are sensitive to cropping and or a ne distortions e.g., rotatio...
Neil F. Johnson, Zoran Duric, Sushil Jajodia
CHES
2006
Springer
137views Cryptology» more  CHES 2006»
15 years 2 months ago
Provably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
Emmanuel Prouff, Christophe Giraud, Sébasti...
95
Voted
ECCV
2010
Springer
15 years 1 months ago
Learning Shape Segmentation Using Constrained Spectral Clustering and Probabilistic Label Transfer
We propose a spectral learning approach to shape segmentation. The method is composed of a constrained spectral clustering algorithm that is used to supervise the segmentation of a...
CODES
2008
IEEE
15 years 24 days ago
A performance-oriented hardware/software partitioning for datapath applications
This article proposes a hardware/software partitioning method targeted to performance-constrained systems for datapath applications. Exploiting a platform based design, a Timed Pe...
Laura Frigerio, Fabio Salice