Sciweavers

644 search results - page 101 / 129
» A topological characterization of weakness
Sort
View
CHI
2005
ACM
16 years 6 days ago
Listening in: practices surrounding iTunes music sharing
This paper presents a descriptive account of the social practices surrounding the iTunes music sharing of 13 participants in one organizational setting. Specifically, we character...
Amy Voida, Rebecca E. Grinter, Nicolas Ducheneaut,...
ISQED
2010
IEEE
227views Hardware» more  ISQED 2010»
15 years 6 months ago
Post-synthesis sleep transistor insertion for leakage power optimization in clock tree networks
Leakage power has grown significantly and is a major challenge in SoC design. Among SoC's components, clock distribution network power accounts for a large portion of chip po...
Houman Homayoun, Shahin Golshan, Eli Bozorgzadeh, ...
ISBI
2009
IEEE
15 years 6 months ago
Structural Annotation of EM Images by Graph Cut
Biological images have the potential to reveal complex signatures that may not be amenable to morphological modeling in terms of shape, location, texture, and color. An effective ...
Hang Chang, Manfred Auer, Bahram Parvin
SAC
2009
ACM
15 years 6 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
ICNP
2009
IEEE
15 years 6 months ago
Principles of Safe Policy Routing Dynamics
—We introduce the Dynamic Policy Routing (DPR) model that captures the propagation of route updates under arbitrary changes in topology or path preferences. DPR introduces the no...
Sam Epstein, Karim Mattar, Ibrahim Matta