Sciweavers

2006 search results - page 271 / 402
» Heuristic Security-Testing Methods
Sort
View
78
Voted
ASPDAC
2006
ACM
100views Hardware» more  ASPDAC 2006»
15 years 6 months ago
Generation of shorter sequences for high resolution error diagnosis using sequential SAT
Commonly used pattern sources in simulation-based verification include random, guided random, or design verification patterns. Although these patterns may help bring the design ...
Sung-Jui (Song-Ra) Pan, Kwang-Ting Cheng, John Moo...
89
Voted
CVPR
2010
IEEE
15 years 6 months ago
Secrets of Optical Flow Estimation and Their Principles
The accuracy of optical flow estimation algorithms has been improving steadily as evidenced by results on the Middlebury optical flow benchmark. The typical formulation, however...
Deqing Sun, Stefan Roth, Michael Black
80
Voted
DATE
2005
IEEE
105views Hardware» more  DATE 2005»
15 years 6 months ago
An Improved Multi-Level Framework for Force-Directed Placement
One of the greatest impediments to achieving high quality placements using force-directed methods lies in the large amount of overlap initially present in these techniques. This o...
Kristofer Vorwerk, Andrew A. Kennings
84
Voted
ICRA
2005
IEEE
161views Robotics» more  ICRA 2005»
15 years 6 months ago
Leveraging Limited Autonomous Mobility to Frame Attractive Group Photos
- Robot photographers have appeared in a variety of novelty settings over the past few years and typically have exploited rudimentary image-content-based approaches to identifying ...
Jason Campbell, Padmanabhan Pillai
127
Voted
WSE
2005
IEEE
15 years 6 months ago
A Comprehensive Model for Web Sites Quality
Many of existing criteria for evaluating web sites quality require methods such as heuristic evaluations, or/and empirical usability tests. This paper aims at defining a quality m...
Oreste Signore