Sciweavers

46 search results - page 2 / 10
» Hardening soft information sources
Sort
View
DAC
2005
ACM
13 years 7 months ago
Constraint-aware robustness insertion for optimal noise-tolerance enhancement in VLSI circuits
Reliability of nanometer circuits is becoming a major concern in today’s VLSI chip design due to interferences from multiple noise sources as well as radiation-induced soft erro...
Chong Zhao, Yi Zhao, Sujit Dey
TNC
2004
120views Education» more  TNC 2004»
13 years 6 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
EDBT
2009
ACM
208views Database» more  EDBT 2009»
14 years 2 days ago
Flexible and efficient querying and ranking on hyperlinked data sources
There has been an explosion of hyperlinked data in many domains, e.g., the biological Web. Expressive query languages and effective ranking techniques are required to convert this...
Ramakrishna Varadarajan, Vagelis Hristidis, Louiqa...
ICASSP
2009
IEEE
14 years 1 days ago
Combining independent component analysis with geometric information and its application to speech processing
In this paper, we propose two approaches for combining geometric information with ICA algorithm to solve permutation problem under the scenario where a rough information about the...
Wenyi Zhang, Bhaskar D. Rao
VTC
2007
IEEE
108views Communications» more  VTC 2007»
13 years 11 months ago
Joint Optimization of Iterative Source and Channel Decoding Using Over-Complete Source-Mapping
— The intentionally imposed or inherent unintentional residual redundancy found in source encoded bitstreams can be exploited for supporting joint SoftBit-Source Decoding and Cha...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo