Sciweavers

377 search results - page 75 / 76
» Effective TARO Pattern Generation
Sort
View
136
Voted
PAMI
2007
127views more  PAMI 2007»
15 years 2 months ago
Text-Independent Writer Identification and Verification Using Textural and Allographic Features
—The identification of a person on the basis of scanned images of handwriting is a useful biometric modality with application in forensic and historic document analysis and const...
Marius Bulacu, Lambert Schomaker
224
Voted
SAC
2008
ACM
15 years 2 months ago
A hybrid software-based self-testing methodology for embedded processor
Software-based self-test (SBST) is emerging as a promising technology for enabling at-speed testing of high-speed embedded processors testing in an SoC system. For SBST, test rout...
Tai-Hua Lu, Chung-Ho Chen, Kuen-Jong Lee
129
Voted
JSS
2008
122views more  JSS 2008»
15 years 1 months ago
Traffic-aware stress testing of distributed real-time systems based on UML models using genetic algorithms
This report presents a model-driven, stress test methodology aimed at increasing chances of discovering faults related to network traffic in Distributed Real-Time Systems (DRTS). T...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
132
Voted
TVCG
2010
126views more  TVCG 2010»
15 years 29 days ago
Modeling Repetitive Motions Using Structured Light
— Obtaining models of dynamic 3D objects is an important part of content generation for computer graphics. Numerous methods have been extended from static scenarios to model dyna...
Yi Xu, Daniel G. Aliaga
141
Voted
ACSAC
2010
IEEE
15 years 20 days ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu