Sciweavers

3128 search results - page 530 / 626
» Finite element method
Sort
View
99
Voted
ICCAD
2007
IEEE
116views Hardware» more  ICCAD 2007»
16 years 6 days ago
Device and architecture concurrent optimization for FPGA transient soft error rate
Late CMOS scaling reduces device reliability, and existing work has studied the permanent SER (soft error rate) for configuration memory in FPGA extensively. In this paper, we sh...
Yan Lin, Lei He
CVPR
2010
IEEE
15 years 11 months ago
Estimating Camera Pose from a Single Urban Ground-View Omnidirectional Image and a 2D Building Outline Map
A framework is presented for estimating the pose of a camera based on images extracted from a single omnidirectional image of an urban scene, given a 2D map with building outlines...
Tat-Jen Cham, Ciptadi Arridhana, Wei-Chian Tan, Mi...
EDBTW
2010
Springer
15 years 10 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
IPSN
2010
Springer
15 years 10 months ago
Consensus-based distributed linear support vector machines
This paper develops algorithms to train linear support vector machines (SVMs) when training data are distributed across different nodes and their communication to a centralized no...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 10 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...