Sciweavers

1548 search results - page 228 / 310
» Estimating Software Vulnerabilities
Sort
View
HIPC
2004
Springer
15 years 4 months ago
Parallel Performance of Hierarchical Multipole Algorithms for Inductance Extraction
Parasitic extraction techniques are used to estimate signal delay in VLSI chips. Inductance extraction is a critical component of the parasitic extraction process in which on-chip ...
Hemant Mahawar, Vivek Sarin, Ananth Grama
IPPS
2003
IEEE
15 years 4 months ago
Targeting Tiled Architectures in Design Exploration
Tiled architectures can provide a model for early estimation of global interconnect costs. A design exploration tool for reconfigurable architectures is currently under developmen...
Lilian Bossuet, Wayne Burleson, Guy Gogniat, Vikas...
ISCAS
2003
IEEE
109views Hardware» more  ISCAS 2003»
15 years 4 months ago
Rate control for advance video coding (AVC) standard
Rate control plays a very important role in constant bit rate (CBR) coding. AVC standard is jointly developed by ISO and ITU-T, which contains several inter and intra prediction m...
Siwei Ma, Wen Gao, Peng Gao, Yan Lu
DSN
2002
IEEE
15 years 4 months ago
Process Modelling to Support Dependability Arguments
This paper reports work to support dependability arguments about the future reliability of a product before there is direct empirical evidence. We develop a method for estimating ...
Robin E. Bloomfield, Sofia Guerra
ICPR
2002
IEEE
15 years 4 months ago
Image Flows and One-Liner Graphical Image Representation
In this paper we introduce a novel graphical image representation comprising a single curve—the one-liner. The first step involves the detection and linking of image edges. We ...
Vadim Makhervaks, Gill Barequet, Alfred M. Bruckst...