Sciweavers

686 search results - page 118 / 138
» Statistical Timing Analysis with Extended Pseudo-Canonical T...
Sort
View
ESORICS
2003
Springer
14 years 2 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ICCAD
2006
IEEE
169views Hardware» more  ICCAD 2006»
14 years 5 months ago
Microarchitecture parameter selection to optimize system performance under process variation
Abstract— Design variability due to within-die and die-todie process variations has the potential to significantly reduce the maximum operating frequency and the effective yield...
Xiaoyao Liang, David Brooks
ICST
2009
IEEE
14 years 3 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
ICWL
2007
Springer
14 years 2 months ago
A Piece-Wise Learning Approach to 3D Facial Animation
Web-based 3D facial animation is an alternative of face to face communication. Animating 3D human faces is also a difficult task because of the substantive non-rigid facial motions...
Yushun Wang, Yueting Zhuang, Jun Xiao, Fei Wu
MM
2003
ACM
124views Multimedia» more  MM 2003»
14 years 2 months ago
Using structure patterns of temporal and spectral feature in audio similarity measure
Although statistical characteristics of audio features are widely used for similarity measure in most of current audio analysis systems and have been proved to be effective, they ...
Rui Cai, Lie Lu, HongJiang Zhang