Sciweavers

6300 search results - page 187 / 1260
» We have it easy, but do we have it right
Sort
View
98
Voted
ICCAD
2008
IEEE
130views Hardware» more  ICCAD 2008»
15 years 10 months ago
Lightweight secure PUFs
— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potk...
ICPR
2010
IEEE
15 years 8 months ago
Integrating a Discrete Motion Model into GMM Based Background Subtraction
GMM based algorithms have become the de facto standard for background subtraction in video sequences, mainly because of their ability to track multiple background distributions, w...
Christian Wolf, Jolion Jolion
IEEEARES
2009
IEEE
15 years 8 months ago
An Architectural Foundation for Security Model Sharing and Reuse
Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
Per Håkon Meland, Shanai Ardi, Jostein Jense...
RECOMB
2009
Springer
15 years 8 months ago
Counting All DCJ Sorting Scenarios
In genome rearrangements, the double cut and join (DCJ) operation, introduced by Yancopoulos et al., allows to represent most rearrangement events that could happen in multichromos...
Marília D. V. Braga, Jens Stoye
ICASSP
2009
IEEE
15 years 8 months ago
A multiplicative weight perturbation scheme for distributed beamforming in wireless relay networks with 1-bit feedback
This paper focuses on perturbation-based distributed beamforming with 1-bit feedback for wireless amplify-and-forward relay networks. We propose to use multiplicative perturbation...
Peter Fertl, Ari Hottinen, Gerald Matz