Sciweavers

1219 search results - page 112 / 244
» Verification of Equivalent-Results Methods
Sort
View
97
Voted
ASPDAC
2008
ACM
168views Hardware» more  ASPDAC 2008»
15 years 5 months ago
A fast two-pass HDL simulation with on-demand dump
- Simulation-based functional verification is characterized by two inherently conflicting targets: the signal visibility and simulation performance. Achieving a proper trade-off be...
Kyuho Shim, Youngrae Cho, Namdo Kim, Hyuncheol Bai...
129
Voted
ICPR
2006
IEEE
15 years 9 months ago
Combining Fingerprint, Palmprint and Hand-Shape for User Authentication
This paper investigates a new approach for personal authentication by combining unique biometric features which can be acquired from hand images alone. The proposed method attempt...
Ajay Kumar, David Zhang
151
Voted
DAGSTUHL
2006
15 years 5 months ago
A System for Object Class Detection
A successful detection and classification system must have two properties: it should be general enough to compensate for intra-class variability and it should be specific enough to...
Daniela Hall
POPL
2005
ACM
16 years 3 months ago
Transition predicate abstraction and fair termination
on Predicate Abstraction and Fair Termination Andreas Podelski Andrey Rybalchenko Max-Planck-Institut f?ur Informatik Saarbr?ucken, Germany Predicate abstraction is the basis of m...
Andreas Podelski, Andrey Rybalchenko
139
Voted
CCS
2008
ACM
15 years 5 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung