Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
In structure from motion, if two metric structures are given, the unknown scale between them can be resolved by constraining the rigidity of the metric space. There exist two well...
Pose estimation plays an essential role in many computer vision applications, such as human computer interaction (HCI), driver attentiveness monitoring, face recognition, automati...
This paper explores the advantages of high performance asynchronous circuits in a semi-custom standard cell environment for high-throughput turbo coding. Turbo codes are high-perf...
Pankaj Golani, Georgios D. Dimou, Mallika Prakash,...
An important aspect of Design for Yield for embedded SRAM is identifying the expected worst case behavior in order to guarantee that sufficient design margin is present. Previousl...