Sciweavers

3972 search results - page 646 / 795
» Cosparse analysis modeling - uniqueness and algorithms
Sort
View
ISQED
2010
IEEE
120views Hardware» more  ISQED 2010»
15 years 10 months ago
Methodology from chaos in IC implementation
— Algorithms and tools used for IC implementation do not show deterministic and predictable behaviors with input parameter changes. Due to suboptimality and inaccuracy of underly...
Kwangok Jeong, Andrew B. Kahng
ISQED
2010
IEEE
177views Hardware» more  ISQED 2010»
15 years 10 months ago
Multi-corner, energy-delay optimized, NBTI-aware flip-flop design
With the CMOS transistors being scaled to sub 45nm and lower, Negative Bias Temperature Instability (NBTI) has become a major concern due to its impact on PMOS transistor aging pr...
Hamed Abrishami, Safar Hatami, Massoud Pedram
CCS
2010
ACM
15 years 10 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
ICDE
2009
IEEE
155views Database» more  ICDE 2009»
15 years 10 months ago
Join Optimization of Information Extraction Output: Quality Matters!
— Information extraction (IE) systems are trained to extract specific relations from text databases. Real-world applications often require that the output of multiple IE systems...
Alpa Jain, Panagiotis G. Ipeirotis, AnHai Doan, Lu...
132
Voted
PERCOM
2009
ACM
15 years 10 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...