For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Several traditional VHDL fault injection mechanisms like mutants or saboteurs have been adapted to SystemC model descriptions. The main drawback of these approaches is the necessi...
We explore techniques for detecting news articles containing invalid information, using the help of text categorization technology. The information that exists on the World Wide W...
This paper presents a robust automatic shape classifier using modular wavelet networks (MWNs). A shape descriptor is constructed based on a combination of global geometric features...
Akshaya Kumar Mishra, Paul W. Fieguth, David A. Cl...
IP networks allow constructing versatile device configurations for multimedia streaming. However, the stochastic nature of the packet-switched data transmission may complicate IP-...
Mika Rautiainen, Hannu Aska, Timo Ojala, Matti Hos...