Sciweavers

9316 search results - page 113 / 1864
» Analysis of traceback techniques
Sort
View
145
Voted
ENGL
2008
97views more  ENGL 2008»
15 years 3 months ago
Hybrid Surface Reconstruction Technique for Automotive Applications
Reverse engineering has become a viable technique to create a 3D virtual model of an existing physical object. It enables the reconstruction of body surfaces to create a suitable C...
Gregory M. Lecrivain, Ian F. Kennedy, Arezki Slaou...
173
Voted
PE
2000
Springer
118views Optimization» more  PE 2000»
15 years 3 months ago
A probabilistic dynamic technique for the distributed generation of very large state spaces
Conventional methods for state space exploration are limited to the analysis of small systems because they suffer from excessive memory and computational requirements. We have dev...
William J. Knottenbelt, Peter G. Harrison, Mark Me...
152
Voted
VIS
2008
IEEE
120views Visualization» more  VIS 2008»
16 years 5 months ago
Size-based Transfer Functions: A New Volume Exploration Technique
The visualization of complex 3D images remains a challenge, a fact that is magnified by the difficulty to classify or segment volume data. In this paper, we introduce size-based tr...
Carlos D. Correa, Kwan-Liu Ma
DAC
2000
ACM
16 years 4 months ago
Forensic engineering techniques for VLSI CAD tools
The proliferation of the Internet has a ected the business model of almost all semiconductor and VLSI CAD companies that rely on intellectual property (IP) as their main source of...
Darko Kirovski, David T. Liu, Jennifer L. Wong, Mi...
151
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof