Sciweavers

3883 search results - page 654 / 777
» Design mentoring based on design evolution analysis
Sort
View
155
Voted
VOTEID
2007
Springer
15 years 10 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
134
Voted
DIAL
2006
IEEE
130views Image Analysis» more  DIAL 2006»
15 years 10 months ago
Improving the Quality of Degraded Document Images
It is common for libraries to provide public access to historical and ancient document image collections. It is common for such document images to require specialized processing i...
Ergina Kavallieratou, Efstathios Stamatatos
EDOC
2006
IEEE
15 years 10 months ago
Enterprise Computing Systems as Information Factories
The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
K. Mani Chandy, Lu Tian, Daniel M. Zimmerman
139
Voted
FCCM
2006
IEEE
121views VLSI» more  FCCM 2006»
15 years 10 months ago
An FPGA Solution for Radiation Dose Calculation
— Radiation dose calculation is an important step in the treatment of cancer patients requiring radiation therapy. It ensures that the physician prescribed dose agrees with the d...
Kevin Whitton, Xiaobo Sharon Hu, Cedric X. Yu, Dan...
137
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
Non-linear Turbo Codes for Interleaver-Division Multiple Access on the OR Channel
Abstract— This paper presents an Interleaver-Division Multiple Access (IDMA) based architecture with single-user decoding using parallel concatenated non-linear trellis codes (PC...
Miguel Griot, Andres I. Vila Casado, Richard D. We...