Sciweavers

276 search results - page 54 / 56
» Accurate and Efficient Static Timing Analysis with Crosstalk
Sort
View
109
Voted
CCS
2006
ACM
15 years 4 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
ICCV
2003
IEEE
16 years 2 months ago
A Segmentation Algorithm for Contrast-Enhanced Images
Medical imaging often involves the injection of contrast agents and the subsequent analysis of tissue enhancement patterns. Many important types of tissue have characteristic enha...
Junhwan Kim, Ramin Zabih
OSDI
2008
ACM
16 years 26 days ago
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
Abstract ? Large enterprise networks consist of thousands of services and applications. The performance and reliability of any particular application may depend on multiple service...
Xu Chen, Ming Zhang, Zhuoqing Morley Mao, Paramvir...
90
Voted
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
15 years 4 months ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
127
Voted
IVS
2008
145views more  IVS 2008»
15 years 17 days ago
Towards a taxonomy of movement patterns
A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...