Sciweavers

657 search results - page 96 / 132
» Same technology, different outcome
Sort
View
WACV
2002
IEEE
14 years 27 days ago
Fingerprint Verification Using Genetic Algorithms
Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. In this p...
Xuejun Tan, Bir Bhanu
CAISE
2001
Springer
14 years 15 days ago
Objects Control for Software Configuration Management
A major requirement in Software Engineering is to reduce the time to market. This requirement along with a demand for product sophistication and better quality has led to larger te...
Jacky Estublier
AES
2000
Springer
82views Cryptology» more  AES 2000»
14 years 11 days ago
Fast Implementations of AES Candidates
Of the five AES finalists four—MARS, RC6, Rijndael, Twofish— have not only (expected) good security but also exceptional performance on the PC platforms, especially on those...
Kazumaro Aoki, Helger Lipmaa
DATE
2010
IEEE
145views Hardware» more  DATE 2010»
14 years 10 days ago
Energy-efficient real-time task scheduling with temperature-dependent leakage
Abstract--Leakage power consumption contributes significantly to the overall power dissipation for systems that are manufactured in advanced deep sub-micron technology. Different f...
Chuan-Yue Yang, Jian-Jia Chen, Lothar Thiele, Tei-...
HOTOS
1999
IEEE
14 years 9 days ago
Conductor: A Framework for Distributed Adaptation
Abstract--End-to-end connectivity is growing increasingly diverse, with orders of magnitude differences in characteristics throughout the network. At the same time, most applicatio...
Mark Yarvis, Peter L. Reiher, Gerald J. Popek