Sciweavers

119 search results - page 21 / 24
» Verification, Performance Analysis and Controller Synthesis ...
Sort
View
ICICIC
2006
IEEE
14 years 1 months ago
Fingerprint Identification Based on Frequency Texture Analysis
Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu
VLSID
2006
IEEE
192views VLSI» more  VLSID 2006»
14 years 1 months ago
Beyond RTL: Advanced Digital System Design
This tutorial focuses on advanced techniques to cope with the complexity of designing modern digital chips which are complete systems often containing multiple processors, complex...
Shiv Tasker, Rishiyur S. Nikhil
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
14 years 8 months ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...
HASE
1997
IEEE
13 years 11 months ago
Automated Computation of Decomposable Synchronization Conditions
: The most important aspect of concurrent and distributed computation is the interaction between system components. Integration of components into a system requires some synchroniz...
Gilberto Matos, James M. Purtilo, Elizabeth L. Whi...
COMPSAC
2010
IEEE
13 years 5 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...