Sciweavers

2006 search results - page 146 / 402
» Heuristic Security-Testing Methods
Sort
View
95
Voted
SECON
2007
IEEE
15 years 7 months ago
On the Prevalence of Sensor Faults in Real-World Deployments
—Various sensor network measurement studies have reported instances of transient faults in sensor readings. In this work, we seek to answer a simple question: How often are such ...
Abhishek Sharma, Leana Golubchik, Ramesh Govindan
78
Voted
DATE
2008
IEEE
105views Hardware» more  DATE 2008»
15 years 7 months ago
Comparison of Boolean Satisfiability Encodings on FPGA Detailed Routing Problems
We compare 12 new encodings for representing of FPGA detailed routing problems as equivalent Boolean Satisfiability (SAT) problems against the only 2 previously used encodings. We...
Miroslav N. Velev, Ping Gao 0002
107
Voted
COMCOM
1998
102views more  COMCOM 1998»
15 years 15 days ago
Preferred link based delay-constrained least-cost routing in wide area networks
Multimedia applications involving digital audio and/or digital video transmissions require strict QoS constraints (end-to-end delay bound, bandwidth availability, packet loss rate...
R. Sriram, Govindarasu Manimaran, C. Siva Ram Murt...
94
Voted
ECCV
2000
Springer
16 years 2 months ago
Divergence-Based Medial Surfaces
The medial surface of a volumetric object is of significant interest for shape analysis. However, its numerical computation can be subtle. Methods based on Voronoi techniques prese...
Sylvain Bouix, Kaleem Siddiqi
93
Voted
VLSID
2002
IEEE
136views VLSI» more  VLSID 2002»
16 years 1 months ago
Buffered Routing Tree Construction under Buffer Placement Blockages
Interconnect delay has become a critical factor in determining the performance of integrated circuits. Routing and buffering are powerful means of improving the circuit speed and ...
Wei Chen, Massoud Pedram, Premal Buch