We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
Future process nodes have such small feature sizes that there will be an increase in the number of manufacturing defects per die. For large FPGAs, it will be critical to tolerate ...
This paper describes our procedure and a software application for conducting large parameter sweep experiments in genetic and evolutionary computation research. Both procedure and...
Michael E. Samples, Jason M. Daida, Matthew J. Byo...
We consider quantitatively establishing the discriminative power of iris biometric data. It is difficult, however, to establish that any biometric modality is capable of distingui...
Abstract. A computer-aided diagnosis (CAD) system to detect smallsize (from 2 mm to around 10 mm) pulmonary nodules in helical CT scans is developed. This system uses different sc...
Xiangwei Zhang, Geoffrey McLennan, Eric A. Hoffman...