Sciweavers

822 search results - page 129 / 165
» Hashing Methods for Temporal Data
Sort
View
ICASSP
2008
IEEE
15 years 8 months ago
Robust video fingerprints based on subspace embedding
We present a novel video fingerprinting method based on subspace embedding. The proposed method is particularly robust against frame-rate conversion attacks and geometric attacks...
Regunathan Radhakrishnan, Claus Bauer
DATE
2007
IEEE
123views Hardware» more  DATE 2007»
15 years 8 months ago
Clock domain crossing fault model and coverage metric for validation of SoC design
Multiple asynchronous clock domains have been increasingly employed in System-on-Chip (SoC) designs for different I/O interfaces. Functional validation is one of the most expensiv...
Yi Feng 0002, Zheng Zhou, Dong Tong, Xu Cheng
FGR
2006
IEEE
263views Biometrics» more  FGR 2006»
15 years 8 months ago
Robust Head Tracking Based on a Multi-State Particle Filter
This paper proposes a novel method for robust and automatic realtime head tracking by fusing face and head cues within a multi-state particle filter. Due to large appearance vari...
Yuan Li, Haizhou Ai, Chang Huang, Shihong Lao
FMCAD
1998
Springer
15 years 6 months ago
Combining Symbolic Model Checking with Uninterpreted Functions for Out-of-Order Processor Verification
We present a new approach to the verification of hardware systems with data dependencies using temporal logic symbolic model checking. As a benchmark we take Tomasulo's algori...
Sergey Berezin, Armin Biere, Edmund M. Clarke, Yun...
ICASSP
2010
IEEE
15 years 2 months ago
Voice source estimation for artificial bandwidth extension of telephone speech
Artificial bandwidth extension (ABWE) of speech signals aims to estimate wideband speech (50 Hz – 7 kHz) from narrowband signals (300 Hz – 3.4 kHz). Applying the source-filt...
Mark R. P. Thomas, Jon Gudnason, Patrick A. Naylor...