Sciweavers

2016 search results - page 56 / 404
» Distributed error confinement
Sort
View
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
12 years 10 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
CVPR
2012
IEEE
12 years 14 days ago
Spatial bias in multi-atlas based segmentation
Multi-atlas segmentation has been widely applied in medical image analysis. With deformable registration, this technique realizes label transfer from pre-labeled atlases to unknow...
Hongzhi Wang, Paul A. Yushkevich
ICCAD
1999
IEEE
81views Hardware» more  ICCAD 1999»
14 years 2 months ago
Modeling design constraints and biasing in simulation using BDDs
Constraining and input biasing are frequently used techniques in functional verification methodologies based on randomized simulation generation. Constraints confine the simulatio...
Jun Yuan, Kurt Shultz, Carl Pixley, Hillel Miller,...
ECOOP
1999
Springer
14 years 2 months ago
Object-Oriented Programming on the Network
Object-oriented programming techniques have been used with great success for some time. But the techniques of object-oriented programming have been largely confined to the single a...
Jim Waldo
BMCBI
2010
149views more  BMCBI 2010»
13 years 10 months ago
S3DB core: a framework for RDF generation and management in bioinformatics infrastructures
Background: Biomedical research is set to greatly benefit from the use of semantic web technologies in the design of computational infrastructure. However, beyond well defined res...
Jonas S. Almeida, Helena F. Deus, Wolfgang Maass