Sciweavers

105 search results - page 18 / 21
» Robust Authentication Using Physically Unclonable Functions
Sort
View
ICCAD
1999
IEEE
97views Hardware» more  ICCAD 1999»
13 years 11 months ago
A methodology for correct-by-construction latency insensitive design
In Deep Sub-Micron (DSM) designs, performance will depend critically on the latency of long wires. We propose a new synthesis methodology for synchronous systems that makes the de...
Luca P. Carloni, Kenneth L. McMillan, Alexander Sa...
SPIESR
1998
190views Database» more  SPIESR 1998»
13 years 8 months ago
NeTra-V: Toward an Object-Based Video Representation
We present here a prototype video analysis and retrieval system, called NeTra-V, that is being developed to build an object-based video representation for functionalities such as s...
Yining Deng, Debargha Mukherjee, B. S. Manjunath
CGF
2007
127views more  CGF 2007»
13 years 7 months ago
A Finite Element Method on Convex Polyhedra
We present a method for animating deformable objects using a novel finite element discretization on convex polyhedra. Our finite element approach draws upon recently introduced ...
Martin Wicke, Mario Botsch, Markus H. Gross
VISUALIZATION
2005
IEEE
14 years 1 months ago
Surface Reconstruction Via Contour Metamorphosis: An Eulerian Approach With Lagrangian Particle Tracking
We present a robust method for 3D reconstruction of closed surfaces from sparsely sampled parallel contours. A solution to this problem is especially important for medical segment...
Ola Nilsson, David E. Breen, Ken Museth
WINET
2010
178views more  WINET 2010»
13 years 2 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...