Sciweavers

276 search results - page 54 / 56
» Accurate and Efficient Static Timing Analysis with Crosstalk
Sort
View
CCS
2006
ACM
15 years 1 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
ICCV
2003
IEEE
15 years 11 months ago
A Segmentation Algorithm for Contrast-Enhanced Images
Medical imaging often involves the injection of contrast agents and the subsequent analysis of tissue enhancement patterns. Many important types of tissue have characteristic enha...
Junhwan Kim, Ramin Zabih
84
Voted
OSDI
2008
ACM
15 years 9 months ago
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
Abstract ? Large enterprise networks consist of thousands of services and applications. The performance and reliability of any particular application may depend on multiple service...
Xu Chen, Ming Zhang, Zhuoqing Morley Mao, Paramvir...
77
Voted
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
15 years 1 months ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
IVS
2008
145views more  IVS 2008»
14 years 9 months ago
Towards a taxonomy of movement patterns
A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...