Sciweavers

2801 search results - page 23 / 561
» On the Adequateness of the Connection Method
Sort
View
MICCAI
2003
Springer
14 years 9 months ago
Analysis Tool for Diffusion Tensor MRI
Abstract. Diffusion Tensor Imaging (DTI) is becoming a routine magnetic resonance technique to study white matter properties and alterations of fiber integrity due to pathology. Th...
Pierre Fillard, Guido Gerig
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
13 years 10 months ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
TRUSTBUS
2010
Springer
13 years 7 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
ASPDAC
2006
ACM
117views Hardware» more  ASPDAC 2006»
14 years 2 months ago
A memory grouping method for sharing memory BIST logic
- With the increasing demand for SoCs to include rich functionality, SoCs are being designed with hundreds of small memories with different sizes and frequencies. If memory BIST lo...
Masahide Miyazaki, Tomokazu Yoneda, Hideo Fujiwara
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 2 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede