Sciweavers

1566 search results - page 260 / 314
» Contification Using Dominators
Sort
View
NPAR
2009
ACM
15 years 4 months ago
Appearance-guided synthesis of element arrangements by example
We present a technique for the analysis and re-synthesis of 2D arrangements of stroke-based vector elements. The capture of an artist’s style by the sole posterior analysis of h...
Thomas Hurtut, Pierre-Edouard Landes, Joëlle ...
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
15 years 4 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
EVOW
2009
Springer
15 years 4 months ago
Validation of a Morphogenesis Model of Drosophila Early Development by a Multi-objective Evolutionary Optimization Algorithm
We apply evolutionary computation to calibrate the parameters of a morphogenesis model of Drosophila early development. The model aims to describe the establishment of the steady g...
Rui Dilão, Daniele Muraro, Miguel Nicolau, ...
ICDCN
2009
Springer
15 years 4 months ago
Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks
The research community has witnessed a large interest in monitoring large scale distributed systems. In these applications typically we wish to monitor a global system condition wh...
Ali Abbasi, Ahmad Khonsari, Mohammad Sadegh Talebi
DATE
2009
IEEE
153views Hardware» more  DATE 2009»
15 years 4 months ago
TRAM: A tool for Temperature and Reliability Aware Memory Design
— Memories are increasingly dominating Systems on Chip (SoC) designs and thus contribute a large percentage of the total system’s power dissipation, area and reliability. In th...
Amin Khajeh, Aseem Gupta, Nikil Dutt, Fadi J. Kurd...