Sciweavers

1414 search results - page 114 / 283
» Completion Energies and Scale
Sort
View
ZUM
2000
Springer
14 years 1 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
ICTAI
2010
IEEE
13 years 7 months ago
From "I Like" to "I Prefer" in Collaborative Filtering
Collaborative filtering exploits user preferences, generally ratings, to provide them with recommendations. However, the ratings may not be completely trustworthy: the rating scale...
Armelle Brun, Ahmad Hamad, Olivier Buffet, Anne Bo...
DATE
2005
IEEE
96views Hardware» more  DATE 2005»
14 years 3 months ago
DVS for On-Chip Bus Designs Based on Timing Error Correction
On-chip buses are typically designed to meet performance constraints at worst-case conditions, including process corner, temperature, IR-drop, and neighboring net switching patter...
Himanshu Kaul, Dennis Sylvester, David Blaauw, Tre...
ISCAS
2003
IEEE
97views Hardware» more  ISCAS 2003»
14 years 3 months ago
Watermark re-synchronization using log-polar mapping of image autocorrelation
Many watermarking algorithms embed the watermark into the image as contiguous non-overlapping tiles. This tiling structure forms an implicit synchronization template that can be r...
Adnan M. Alattar, Joel Meyer
ICIP
2005
IEEE
14 years 3 months ago
Fast and subpixel precise blob detection and attribution
This paper introduces an algorithm for fast and subpixel precise detection of small, compact image primitives (”blobs”). The algorithm is based on differential geometry and in...
Stefan Hinz