Sciweavers

2904 search results - page 193 / 581
» Valuing Design Repair
Sort
View
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
15 years 10 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon
118
Voted
ISCAS
2003
IEEE
123views Hardware» more  ISCAS 2003»
15 years 10 months ago
Fast prototyping of reconfigurable architectures from a C program
Rapid evaluation and design space exploration at the algorithmic level are important issues in the design cycle. In this paper we propose an original area vs delay estimation meth...
Sebastien Bilavarn, Guy Gogniat, Jean Luc Philippe...
116
Voted
CDC
2009
IEEE
103views Control Systems» more  CDC 2009»
15 years 9 months ago
A new decentralization technique for interconnected systems
— This paper deals with LTI interconnected systems whose subsystems have coupled dynamics. The objective is to decentralize a given centralized controller satisfying some prescri...
Javad Lavaei
CHINZ
2005
ACM
15 years 7 months ago
Exploring sketch beautification techniques
Beautification of vague, imprecise sketchy ink input is an interesting area for exploration, especially with the emergence of pen-based systems, such as the Tablet PC. Fifty perce...
Beirong Wang, Jian Sun, Beryl Plimmer
CCE
2007
15 years 4 months ago
An agent-based approach for supply chain retrofitting under uncertainty
In this work, decisions that have a long lasting effect on the SC such as the design and retrofit of a production/distribution network are considered. The retrofitting tasks are a...
Fernando D. Mele, Gonzalo Guillén, Antonio ...