Sciweavers

600 search results - page 72 / 120
» Problems and results in extremal combinatorics - II
Sort
View
ISBI
2008
IEEE
14 years 10 months ago
Phase contrast image segmentation by weak watershed transform assembly
We present here a method giving a robust segmentation for in vitro cells observed under standard phase-contrast microscopy. We tackle the problem using the watershed transform. Wa...
Olivier Debeir, Ivan Adanja, Nadine Warzée,...
ICCAD
2006
IEEE
93views Hardware» more  ICCAD 2006»
14 years 6 months ago
Precise identification of the worst-case voltage drop conditions in power grid verification
– Identifying worst-case voltage drop conditions in every module supplied by the power grid is a crucial problem in modern IC design. In this paper we develop a novel methodology...
Nestoras E. Evmorfopoulos, Dimitris P. Karampatzak...
DATE
2008
IEEE
114views Hardware» more  DATE 2008»
14 years 3 months ago
Operating System Controlled Processor-Memory Bus Encryption
—Unencrypted data appearing on the processor– memory bus can result in security violations, e.g., allowing attackers to gather keys to financial accounts and personal data. Al...
Xi Chen, Robert P. Dick, Alok N. Choudhary
CRYPTO
2007
Springer
105views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
In this paper we identify the (P, Q)-DDH assumption, as an extreme, powerful generalization of the Decisional Diffie-Hellman (DDH) assumption: virtually all previously proposed gen...
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazar&...
ICDAR
2005
IEEE
14 years 2 months ago
Fast Convolutional OCR with the Scanning N-Tuple Grid
This paper introduces a novel high speed convolutional character recognition system. Convolutional mode operation means that no prior localization or segmentation of characters is...
Simon M. Lucas, Kyu Tae Cho