Sciweavers

741 search results - page 77 / 149
» An Analysis of Rule Evaluation Metrics
Sort
View
JSAC
2006
103views more  JSAC 2006»
13 years 8 months ago
Performance analysis of M-ary PPM TH-UWB systems in the presence of MUI and timing jitter
The symbol error probability (SEP) performance of time-hopping (TH) ultra-wideband (UWB) systems in the presence of multiuser interference (MUI) and timing jitter is considered wit...
N. V. Kokkalis, P. Takis Mathiopoulos, George K. K...
IEEEPACT
2006
IEEE
14 years 2 months ago
Complexity-based program phase analysis and classification
Modeling and analysis of program behavior are at the foundation of computer system design and optimization. As computer systems become more adaptive, their efficiency increasingly...
Chang-Burm Cho, Tao Li
MEDIAFORENSICS
2010
13 years 6 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
14 years 2 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
ICDAR
2011
IEEE
12 years 7 months ago
A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures
—Table detection is always an important task of document analysis and recognition. In this paper, we propose a novel and effective table detection method via visual separators an...
Jing Fang, Liangcai Gao, Kun Bai, Ruiheng Qiu, Xin...