Sciweavers

271 search results - page 27 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
DAC
2010
ACM
13 years 11 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ICCV
2009
IEEE
15 years 22 days ago
Globally Optimal Affine Epipolar Geometry from Apparent Contours
We study the problem of estimating the epipolar geometry from apparent contours of smooth curved surfaces with affine camera models. Since apparent contours are viewpoint depend...
Gang Li, Yanghai Tsin
ISBI
2002
IEEE
14 years 8 months ago
Automated determination of protein subcellular locations from 3D fluorescence microscope images
Knowing the subcellular location of a protein is critical to a full understanding of its function, and automated, objective methods for assigning locations are needed as part of t...
Meel Velliste, Robert F. Murphy
WSC
1997
13 years 9 months ago
Before Dynamic Simulation: Systematic Layout Design from Scratch
Excellent production design and planning depends on accurate simulation of a high quality layout. A good layout project will always begin with an analysis of the production volume...
David P. Sly
ICCD
2002
IEEE
113views Hardware» more  ICCD 2002»
14 years 22 days ago
A Framework for Data Prefetching Using Off-Line Training of Markovian Predictors
An important technique for alleviating the memory bottleneck is data prefetching. Data prefetching solutions ranging from pure software approach by inserting prefetch instructions...
Jinwoo Kim, Krishna V. Palem, Weng-Fai Wong