Sciweavers

4693 search results - page 795 / 939
» Verifying Hybrid Systems
Sort
View
100
Voted
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
15 years 7 months ago
System-level hardware-based protection of memories against soft-errors
We present a hardware-based approach to improve the resilience of a computer system against the errors occurred in the main memory with the help of error detecting and correcting ...
Valentin Gherman, Samuel Evain, Mickael Cartron, N...
115
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Opportunistic Cell Edge Selection in Multi-Cell OFDMA Networks
Abstract— We propose an intercell downlink orthogonal frequency division multiple access (OFDMA) scheduling technique in a sectorized cellular network. Adjacent sectors from neig...
Chun Kin Au-Yeung, Amine Maaref, Jinyun Zhang
HOST
2009
IEEE
15 years 7 months ago
Detecting Trojan Circuit Attacks
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
Gedare Bloom, Bhagirath Narahari, Rahul Simha
74
Voted
ICASSP
2009
IEEE
15 years 7 months ago
Automatic pronunciation verification of english letter-names for early literacy assessment of preliterate children
Children need to master reading letter-names and lettersounds before reading phrases and sentences. Pronunciation assessment of letter-names and letter-sounds read aloud is an imp...
Matthew Black, Joseph Tepperman, Abe Kazemzadeh, S...
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 7 months ago
Optimum TCM Codes Design for Gaussian Channels by Considering Both Euclidean and Hamming Distances
—Trellis-coded modulation (TCM) is an attractive coded modulation technique which yields significant coding gain without bandwidth expansion. So far, researches concerning the o...
Xiao-Xin Zhang, Yuping Zhao, Li Zou