Sciweavers

2129 search results - page 355 / 426
» Cutting-Edge Timing Analysis Techniques
Sort
View
CIMCA
2008
IEEE
15 years 4 months ago
Mining Bug Repositories--A Quality Assessment
The process of evaluating, classifying, and assigning bugs to programmers is a difficult and time consuming task which greatly depends on the quality of the bug report itself. It ...
Philipp Schügerl, Juergen Rilling, Philippe C...
DFT
2008
IEEE
138views VLSI» more  DFT 2008»
15 years 4 months ago
Exploring Density-Reliability Tradeoffs on Nanoscale Substrates: When do smaller less reliable devices make sense?
It is widely recognized that device and interconnect fabrics at the nanoscale will be characterized by an increased susceptibility to transient faults. This appears to be intrinsi...
Andrey V. Zykov, Gustavo de Veciana
IPPS
2008
IEEE
15 years 4 months ago
SWAMP: Smith-Waterman using associative massive parallelism
One of the most commonly used tools by computational biologists is some form of sequence alignment. Heuristic alignment algorithms developed for speed and their multiple results s...
Shannon Steinfadt, Johnnie W. Baker
MMM
2008
Springer
128views Multimedia» more  MMM 2008»
15 years 4 months ago
Semantic Quantization of 3D Human Motion Capture Data Through Spatial-Temporal Feature Extraction
3D motion capture is a form of multimedia data that is widely used in animation and medical fields (such as physical medicine and rehabilitation where body joint analysis is neede...
Yohan Jin, B. Prabhakaran
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 4 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...