Sciweavers

1414 search results - page 216 / 283
» Combining Intruder Theories
Sort
View
TCAD
2008
106views more  TCAD 2008»
14 years 9 months ago
Track Routing and Optimization for Yield
Abstract--In this paper, we propose track routing and optimization for yield (TROY), the first track router for the optimization of yield loss due to random defects. As the probabi...
Minsik Cho, Hua Xiang, Ruchir Puri, David Z. Pan
AUTOMATICA
2005
152views more  AUTOMATICA 2005»
14 years 9 months ago
Identification of dynamical systems with a robust interval fuzzy model
In this paper we present a new method of interval fuzzy model identification. The method combines a fuzzy identification methodology with some ideas from linear programming theory...
Igor Skrjanc, Saso Blazic, Osvaldo E. Agamennoni
TIT
2008
86views more  TIT 2008»
14 years 9 months ago
A One-to-One Code and Its Anti-Redundancy
One-to-one codes are "one shot" codes that assign a distinct codeword to source symbols and are not necessarily prefix codes (more generally, uniquely decodable). For ex...
Wojciech Szpankowski
TMI
2008
144views more  TMI 2008»
14 years 9 months ago
Automatic Detection of Regional Heart Rejection in USPIO-Enhanced MRI
Contrast-enhanced magnetic resonance imaging (MRI) is useful to study the infiltration of cells in vivo. This research adopts ultrasmall superparamagnetic iron oxide (USPIO) parti...
Hsun-Hsien Chang, José M. F. Moura, Yijen L...
CAGD
2005
86views more  CAGD 2005»
14 years 9 months ago
A variational approach to spline curves on surfaces
Given an m-dimensional surface in Rn , we characterize parametric curves in , which interpolate or approximate a sequence of given points pi and minimize a given energy functio...
Helmut Pottmann, Michael Hofer