Sciweavers

297 search results - page 41 / 60
» Paternity analysis in Excel
Sort
View
ICIAR
2004
Springer
14 years 27 days ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
DATE
2003
IEEE
128views Hardware» more  DATE 2003»
14 years 25 days ago
Flexible and Formal Modeling of Microprocessors with Application to Retargetable Simulation
Given the growth in application-specific processors, there is a strong need for a retargetable modeling framework that is capable of accurately capturing complex processor behavi...
Wei Qin, Sharad Malik
INFOCOM
2003
IEEE
14 years 24 days ago
Asymptotic Insensitivity of Least-Recently-Used Caching to Statistical Dependency
Abstract— We investigate a widely popular Least-RecentlyUsed (LRU) cache replacement algorithm with semi-Markov modulated requests. Semi-Markov processes provide the flexibility...
Predrag R. Jelenkovic, Ana Radovanovic
ISCAS
2003
IEEE
103views Hardware» more  ISCAS 2003»
14 years 24 days ago
Low-noise biasing of voltage-controlled oscillators by means of resonant inductive degeneration
Many of the existing theories on phase-noise generation in oscillators are concerned with the noise originating from the active part and the resonator, while the contribution of t...
Aleksandar Tasic, Wouter A. Serdijn, John R. Long
DOCENG
2003
ACM
14 years 24 days ago
Lazy XSL transformations
We introduce a lazy XSLT interpreter that provides random access to the transformation result. This allows efficient pipelining of transformation sequences. Nodes of the result tr...
Steffen Schott, Markus L. Noga