Sciweavers

2714 search results - page 409 / 543
» Model comparison with GenericDiff
Sort
View
117
Voted
HOST
2008
IEEE
15 years 9 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris
104
Voted
ICIP
2008
IEEE
15 years 9 months ago
Localized and computationally efficient approach to shift-variant image deblurring
A new localized and computationally efficient approach is presented for shift/space-variant image restoration. Unlike conventional approaches, it models shift-variant blurring in...
Murali Subbarao, Youn-sik Kang, Satyaki Dutta, Xue...
151
Voted
IISWC
2008
IEEE
15 years 9 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
113
Voted
ISM
2008
IEEE
101views Multimedia» more  ISM 2008»
15 years 9 months ago
Photo Context as a Bag of Words
In the recent years, photo context metadata (e.g., date, GPS coordinates) have been proved to be useful in the management of personal photos. However, these metadata are still poo...
Windson Viana, Samira Hammiche, Marlène Vil...
132
Voted
ITNG
2008
IEEE
15 years 9 months ago
Parallel FFT Algorithms on Network-on-Chips
This paper presents several parallel FFT algorithms with different degree of communication overhead for multiprocessors in Network-on-Chip(NoC) environment. Three different method...
Jun Ho Bahn, Jungsook Yang, Nader Bagherzadeh