Abstract– This paper presents an improved topological algorithm for device-level analog placement with symmetry constraints. Based on the exploration of symmetric-feasible sequen...
Karthik Krishnamoorthy, Sarat C. Maruvada, Florin ...
This paper aims to propose an extension of SOMs called an “SOM of SOMs,” or SOM¾ , in which the mapped objects are self-organizing maps themselves. In SOM¾ , each nodal unit ...
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Present approaches to human face detection have made several assumptions that restrict their ability to be extended to general imaging conditions. We identify that the key factori...
Abstract. There are a range of abstractions used for both modelling and proof modern computational systems. While these abstractions may have been devised for specific purposes, t...