Sciweavers

11718 search results - page 2088 / 2344
» Testing database applications
Sort
View
ECOOPW
2006
Springer
15 years 6 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
112
Voted
FPGA
2006
ACM
129views FPGA» more  FPGA 2006»
15 years 6 months ago
Power-aware RAM mapping for FPGA embedded memory blocks
Embedded memory blocks are important resources in contemporary FPGA devices. When targeting FPGAs, application designers often specify high-level memory functions which exhibit a ...
Russell Tessier, Vaughn Betz, David Neto, Thiagara...
95
Voted
GECCO
2006
Springer
265views Optimization» more  GECCO 2006»
15 years 6 months ago
Cutting stock waste reduction using genetic algorithms
A new model for the One-dimensional Cutting Stock problem using Genetic Algorithms (GA) is developed to optimize construction steel bars waste. One-dimensional construction stocks...
Yaser M. A. Khalifa, O. Salem, A. Shahin
ARVLSI
2001
IEEE
305views VLSI» more  ARVLSI 2001»
15 years 6 months ago
Logic Design Considerations for 0.5-Volt CMOS
As the operating supply voltage for commercial CMOS devices falls below 2 V, research activities are underway to develop CMOS integrated circuits that can operate at supply voltag...
K. Joseph Hass, Jack Venbrux, Prakash Bhatia
AVBPA
2001
Springer
146views Biometrics» more  AVBPA 2001»
15 years 6 months ago
Robust Face Detection Using the Hausdorff Distance
Abstract. The localization of human faces in digital images is a fundamental step in the process of face recognition. This paper presents a shape comparison approach to achieve fas...
Oliver Jesorsky, Klaus J. Kirchberg, Robert Frisch...
« Prev « First page 2088 / 2344 Last » Next »