Sciweavers

1354 search results - page 121 / 271
» Comparing Agent-Oriented Methodologies
Sort
View
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
15 years 1 months ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek
SGP
2007
15 years 10 days ago
Fast normal vector compression with bounded error
We present two methods for lossy compression of normal vectors through quantization using "base" polyhedra. The first revisits subdivision-based quantization. The second...
Eric J. Griffith, Michal Koutek, Frits H. Post
WSC
2008
15 years 7 days ago
Simulation as a tool for life cycle cost analysis
Life cycle cost is an essential approach to decide on alternative rehabilitation strategies for infrastructure systems. Monte Carlo simulation approach is used to develop a stocha...
Khaled Shahata, Tarek Zayed
ASPDAC
2005
ACM
92views Hardware» more  ASPDAC 2005»
14 years 12 months ago
Sleep transistor sizing using timing criticality and temporal currents
— Power gating is a circuit technique that enables high performance and low power operation. One of the challenges in power gating is sizing the sleep transistor which is used to...
Anand Ramalingam, Bin Zhang, Anirudh Devgan, David...
DAC
2005
ACM
14 years 12 months ago
Performance space modeling for hierarchical synthesis of analog integrated circuits
Automated analog sizing is becoming an unavoidable solution for increasing analog design productivity. The complexity of typical analog SoC subsystems however calls for efficient ...
Georges G. E. Gielen, Trent McConaghy, Tom Eeckela...