Sciweavers

363 search results - page 69 / 73
» Validation coverage analysis for complex digital designs
Sort
View
ISPASS
2006
IEEE
14 years 1 months ago
Modeling TCAM power for next generation network devices
Applications in Computer Networks often require high throughput access to large data structures for lookup and classification. Many advanced algorithms exist to speed these searc...
Banit Agrawal, Timothy Sherwood
CVPR
2011
IEEE
13 years 2 months ago
Accelerated Low-Rank Visual Recovery by Random Projection
Exact recovery from contaminated visual data plays an important role in various tasks. By assuming the observed data matrix as the addition of a low-rank matrix and a sparse matri...
Yadong Mu, Jian Dong, Xiaotong Yuan, Shuicheng Yan
ICCV
1999
IEEE
14 years 9 months ago
Fluid Motion Recovery by Coupling Dense and Parametric Vector Fields
In this paper we address the problem of estimating and analyzing the motion in image sequences that involve fluid phenomena. In this context standard motion estimation techniques ...
Étienne Mémin, Patrick Pérez
IWSEC
2009
Springer
14 years 2 months ago
Improved Distinguishing Attacks on HC-256
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM com...
Gautham Sekar, Bart Preneel
TSE
2002
157views more  TSE 2002»
13 years 7 months ago
Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects
A number of papers have investigated the relationships between design metrics and the detection of faults in object-oriented software. Several of these studies have shown that suc...
Lionel C. Briand, Walcélio L. Melo, Jü...