This paper focuses on generating efficient software pipelined schedules for in-order machines, which we call Converged Trace Schedules. For a candidate loop, we form a string of t...
Pattern completion in a neural network model of the thalamus and a biologically plausible model of synaptic plasticity are the key concepts used in this paper for analyzing some c...
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g., durations of keystrokes and latencies between ke...
Abstract— Human can efficiently grasp and dextrously manipulate various objects using their fingers cooperatively. When they attain proficiency in the rotating manipulation of...
Yuichi Kurita, Kazuyuki Nagata, Jun Ueda, Yoshio M...
We describe a face mosaicing scheme that generates a composite face image during enrollment based on the evidence provided by frontal and semi-profile face images of an individual...