Sciweavers

688 search results - page 119 / 138
» Comparison of Conceptual Graphs
Sort
View
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
15 years 4 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 3 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
CIKM
2008
Springer
15 years 1 months ago
Classifying networked entities with modularity kernels
Statistical machine learning techniques for data classification usually assume that all entities are i.i.d. (independent and identically distributed). However, real-world entities...
Dell Zhang, Robert Mao
ATMOS
2007
119views Optimization» more  ATMOS 2007»
15 years 1 months ago
Models for Railway Track Allocation
The optimal track allocation problem (OPTRA) is to find, in a given railway network, a conflict free set of train routes of maximum value. We study two types of integer programmi...
Ralf Borndörfer, Thomas Schlechte
APVIS
2008
15 years 1 months ago
MobiVis: A Visualization System for Exploring Mobile Data
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...
Zeqian Shen, Kwan-Liu Ma