Sciweavers

4072 search results - page 712 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
AICCSA
2008
IEEE
301views Hardware» more  AICCSA 2008»
15 years 1 months ago
Cooperative criminal face recognition in distributed web environment
This paper presents a multi-agent framework for distributed web-based face recognition using fuzzy logic based result fusion mechanism. The model is designed in JADE framework and...
Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad...
MLDM
2008
Springer
14 years 11 months ago
Distributed Monitoring of Frequent Items
Monitoring frequently occuring items is a recurring task in a variety of applications. Although a number of solutions have been proposed there has been few to address the problem i...
Robert Fuller, Mehmed M. Kantardzic
ORL
1998
136views more  ORL 1998»
14 years 11 months ago
A primal-dual interpretation of two 2-approximation algorithms for the feedback vertex set problem in undirected graphs
Recently, Becker and Geiger and Bafna, Berman and Fujito gave 2-approximation algorithms for the feedback vertex set problem in undirected graphs. We show how their algorithms can...
Fabián A. Chudak, Michel X. Goemans, Dorit ...
ICCAD
2009
IEEE
151views Hardware» more  ICCAD 2009»
14 years 9 months ago
Timing yield-aware color reassignment and detailed placement perturbation for double patterning lithography
Double patterning lithography (DPL) is a likely resolution enhancement technique for IC production in 32nm and below technology nodes. However, DPL gives rise to two independent, ...
Mohit Gupta, Kwangok Jeong, Andrew B. Kahng
ICCAD
2003
IEEE
148views Hardware» more  ICCAD 2003»
15 years 8 months ago
The Compositional Far Side of Image Computation
Symbolic image computation is the most fundamental computation in BDD-based sequential system optimization and formal verification. In this paper, we explore the use of over-appr...
Chao Wang, Gary D. Hachtel, Fabio Somenzi