Sciweavers

10907 search results - page 2119 / 2182
» Constraint Based Strategies
Sort
View
DATE
2007
IEEE
86views Hardware» more  DATE 2007»
15 years 4 months ago
Reduction of detected acceptable faults for yield improvement via error-tolerance
Error-tolerance is an innovative way to enhance the effective yield of IC products. Previously a test methodology based on error-rate estimation to support error-tolerance was pro...
Tong-Yu Hsieh, Kuen-Jong Lee, Melvin A. Breuer
ICC
2007
IEEE
151views Communications» more  ICC 2007»
15 years 4 months ago
Sensing-Throughput Tradeoff for Cognitive Radio Networks
— In cognitive radio networks, the secondary network (users) are allowed to utilize the frequency bands of primary network (users) when they are not currently being used. To supp...
Ying-Chang Liang, Yonghong Zeng, Edward Chu Yeow P...
57
Voted
ICC
2007
IEEE
135views Communications» more  ICC 2007»
15 years 4 months ago
Two-Dimensional Generalized Partial Response Equalizer for Bit-Patterned Media
The use of bit-patterned media is one of the approaches being investigated to extend magnetic recording densities to 1 Tbit/in2 and beyond. In patterned media, track pitch may be s...
Sheida Nabavi, B. V. K. Vijaya Kumar
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 4 months ago
Applying Techniques from Frame Synchronization for Biological Sequence Analysis
— During the last years, the amount of genetic data available has increased rapidly which creates the demand for advanced techniques for their interpretation. In the following, w...
Johanna Weindl, Joachim Hagenauer
INFOCOM
2007
IEEE
15 years 4 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
« Prev « First page 2119 / 2182 Last » Next »