Sciweavers

342 search results - page 49 / 69
» Reuse, Standardization, and Transformation of Requirements
Sort
View
ESAS
2004
Springer
14 years 24 days ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
14 years 19 days ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
IOLTS
2002
IEEE
99views Hardware» more  IOLTS 2002»
14 years 10 days ago
A BIST-Based Solution for the Diagnosis of Embedded Memories Adopting Image Processing Techniques
This paper proposes a new solution for the diagnosis of faults into embedded RAMs, currently under evaluation within STMicroelectronics. The proposed scheme uses dedicated circuit...
Davide Appello, Alessandra Fudoli, Vincenzo Tancor...
CVPR
2004
IEEE
13 years 11 months ago
Learning in Region-Based Image Retrieval with Generalized Support Vector Machines
Relevance feedback approaches based on support vector machine (SVM) learning have been applied to significantly improve retrieval performance in content-based image retrieval (CBI...
Iker Gondra, Douglas R. Heisterkamp
SIAMSC
2008
151views more  SIAMSC 2008»
13 years 7 months ago
Accurate Floating-Point Summation Part I: Faithful Rounding
Given a vector of floating-point numbers with exact sum s, we present an algorithm for calculating a faithful rounding of s, i.e. the result is one of the immediate floating-point ...
Siegfried M. Rump, Takeshi Ogita, Shin'ichi Oishi