Sciweavers

5864 search results - page 226 / 1173
» Can We Work around Numerical Methods
Sort
View
TCAD
2008
103views more  TCAD 2008»
15 years 5 months ago
Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems
Latency-insensitive protocols allow system-on-chip (SoC) engineers to decouple the design of the computing cores from the design of the intercore communication channels while follo...
Rebecca L. Collins, Luca P. Carloni
BMCBI
2006
95views more  BMCBI 2006»
15 years 5 months ago
A quantitative analysis of secondary RNA structure using domination based parameters on trees
Background: It has become increasingly apparent that a comprehensive database of RNA motifs is essential in order to achieve new goals in genomic and proteomic research. Secondary...
Teresa W. Haynes, Debra J. Knisley, Edith Seier, Y...
ACIVS
2006
Springer
15 years 11 months ago
A New Fuzzy-Based Wavelet Shrinkage Image Denoising Technique
This paper focuses on fuzzy image denoising techniques. In particular, we investigate the usage of fuzzy set theory in the domain of image enhancement using wavelet thresholding. W...
Stefan Schulte, Bruno Huysmans, Aleksandra Pizuric...
ICRA
2009
IEEE
134views Robotics» more  ICRA 2009»
15 years 11 months ago
Combining search and action for mobile robots
— We explore the interconnection between search and action in the context of mobile robotics. The task of searching for an object and then performing some action with that object...
Geoffrey Hollinger, Dave Ferguson, Siddhartha Srin...
CORR
2007
Springer
95views Education» more  CORR 2007»
15 years 5 months ago
A Note on the Periodicity and the Output Rate of Bit Search Type Generators
We investigate the bit-search type irregular decimation algorithms that are used within LFSR-based stream ciphers. In particular, we concentrate on BSG and ABSG, and consider two ...
Yucel Altug, N. Polat Ayerden, Mehmet Kivanç...