Sciweavers

79 search results - page 9 / 16
» Functional Verification of Large ASICs
Sort
View
ACMSE
2004
ACM
14 years 4 days ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
CSB
2005
IEEE
118views Bioinformatics» more  CSB 2005»
14 years 10 days ago
A Protein Interaction Verification System Based on a Neural Network Algorithm
Large amounts of protein-protein interaction data have been identified using various genome-scale screening techniques. Although interaction data is a valuable resource, high-thro...
Min Su Lee, Seung-Soo Park, Min Kyung Kim
WACV
2002
IEEE
13 years 11 months ago
Fingerprint Verification Using Genetic Algorithms
Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. In this p...
Xuejun Tan, Bir Bhanu
ICASSP
2011
IEEE
12 years 10 months ago
Exploring implicit score normalization techniques in speaker verification
In this paper we first introduce four kinds of modification of Symmetric Scoring [1] which produce likelihood ratios that do not need to be explicitly normalized, i.e. T-norm, Z...
Ce Zhang, Rong Zheng, Bo Xu
ICCD
2001
IEEE
103views Hardware» more  ICCD 2001»
14 years 3 months ago
Fixed-outline Floorplanning through Better Local Search
Classical floorplanning minimizes a linear combination of area and wirelength. When Simulated Annealing is used, e.g., with the Sequence Pair representation, the typical choice o...
Saurabh N. Adya, Igor L. Markov