Sciweavers

9316 search results - page 1751 / 1864
» Analysis of traceback techniques
Sort
View
81
Voted
EUROSYS
2007
ACM
15 years 9 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
EUROGRAPHICS
2010
Eurographics
15 years 9 months ago
Adding Depth to Cartoons Using Sparse Depth (In)equalities
This paper presents a novel interactive approach for adding depth information into hand-drawn cartoon images and animations. In comparison to previous depth assignment techniques ...
Daniel Sýkora, David Sedlacek, Sun Jinchao, John ...
ICCAD
2006
IEEE
112views Hardware» more  ICCAD 2006»
15 years 8 months ago
A new RLC buffer insertion algorithm
Most existing buffering algorithms neglect the impact of inductance on circuit performance, which causes large error in circuit analysis and optimization. Even for the approaches...
Zhanyuan Jiang, Shiyan Hu, Jiang Hu, Zhuo Li, Weip...
ICCAD
2006
IEEE
101views Hardware» more  ICCAD 2006»
15 years 8 months ago
A spectrally accurate integral equation solver for molecular surface electrostatics
Electrostatic analysis of complicated molecular surfaces arises in a number of nanotechnology applications including: biomolecule design, carbon nanotube simulation, and molecular...
Shih-Hsien Kuo, Jacob White
ICCAD
2003
IEEE
109views Hardware» more  ICCAD 2003»
15 years 8 months ago
Large-Scale Circuit Placement: Gap and Promise
Placement is one of the most important steps in the RTLto-GDSII synthesis process, as it directly defines the interconnects, which have become the bottleneck in circuit and syste...
Jason Cong, Tim Kong, Joseph R. Shinnerl, Min Xie,...
« Prev « First page 1751 / 1864 Last » Next »