Sciweavers

1219 search results - page 191 / 244
» Verification of Equivalent-Results Methods
Sort
View
COMBINATORICS
2000
84views more  COMBINATORICS 2000»
13 years 9 months ago
A Note on the Asymptotic Behavior of the Heights in b-Tries for b Large
We study the limiting distribution of the height in a generalized trie in which external nodes are capable to store up to b items (the so called b-tries). We assume that such a tr...
Charles Knessl, Wojciech Szpankowski
PAMI
2007
152views more  PAMI 2007»
13 years 9 months ago
DCT-Based Iris Recognition
—This paper presents a novel iris coding method based on differences of discrete cosine transform (DCT) coefficients of overlapped angular patches from normalized iris images. Th...
Donald M. Monro, Soumyadip Rakshit, Dexin Zhang
FMICS
2010
Springer
13 years 8 months ago
A Study of Shared-Memory Mutual Exclusion Protocols Using CADP
Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurr...
Radu Mateescu, Wendelin Serwe
FORMATS
2010
Springer
13 years 8 months ago
Layered Composition for Timed Automata
Abstract. We investigate layered composition for real-time systems modelled as (networks of) timed automata (TA). We first formulate the principles of layering and transition indep...
Ernst-Rüdiger Olderog, Mani Swaminathan
ICCAD
2010
IEEE
162views Hardware» more  ICCAD 2010»
13 years 8 months ago
Practical placement and routing techniques for analog circuit designs
1In this paper, we will present an effective layout method for analog circuits. We consider symmetry constraint, common centroid constraint, device merging and device clustering du...
Linfu Xiao, Evangeline F. Y. Young, Xiaoyong He, K...