Sciweavers

6409 search results - page 1117 / 1282
» A Computational Algorithm for Origami Design
Sort
View
RAID
2004
Springer
15 years 7 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
ICCAD
2003
IEEE
205views Hardware» more  ICCAD 2003»
15 years 7 months ago
Statistical Timing Analysis for Intra-Die Process Variations with Spatial Correlations
Process variations have become a critical issue in performance verification of high-performance designs. We present a new, statistical timing analysis method that accounts for int...
Aseem Agarwal, David Blaauw, Vladimir Zolotov
127
Voted
ICCAD
2003
IEEE
193views Hardware» more  ICCAD 2003»
15 years 7 months ago
FROSTY: A Fast Hierarchy Extractor for Industrial CMOS Circuits
: This paper presents FROSTY, a computer program for automatically extracting the hierarchy of a large-scale digital CMOS circuit from its transistor-level netlist description and ...
Lei Yang, C.-J. Richard Shi
ISCAS
2003
IEEE
128views Hardware» more  ISCAS 2003»
15 years 7 months ago
Placement with symmetry constraints for analog layout using red-black trees
– The traditional way of approaching placement problems in computer-aided design (CAD) tools for analog layout is to explore an extremely large search space of feasible or unfeas...
Sarat C. Maruvada, Karthik Krishnamoorthy, Subodh ...
VISUALIZATION
2003
IEEE
15 years 7 months ago
A Constraint-Based Technique for Haptic Volume Exploration
We present a haptic rendering technique that uses directional constraints to facilitate enhanced exploration modes for volumetric datasets. The algorithm restricts user motion in ...
Milan Ikits, J. Dean Brederson, Charles D. Hansen,...
« Prev « First page 1117 / 1282 Last » Next »