Sciweavers

227 search results - page 32 / 46
» Identifying and Generating Easy Sets of Constraints for Clus...
Sort
View
FDL
2008
IEEE
15 years 6 months ago
Contradiction Analysis for Constraint-based Random Simulation
Constraint-based random simulation is state-of-the-art in verification of multi-million gate industrial designs. This method is based on stimulus generation by constraint solving...
Daniel Große, Robert Wille, Robert Siegmund,...
WWW
2008
ACM
16 years 7 days ago
As we may perceive: finding the boundaries of compound documents on the web
This paper considers the problem of identifying on the Web compound documents (cDocs) ? groups of web pages that in aggregate constitute semantically coherent information entities...
Pavel Dmitriev
IH
2001
Springer
15 years 4 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
SIGMETRICS
2011
ACM
270views Hardware» more  SIGMETRICS 2011»
14 years 2 months ago
Scalable monitoring via threshold compression in a large operational 3G network
Threshold-based performance monitoring in large 3G networks is very challenging for two main factors: large network scale and dynamics in both time and spatial domains. There exis...
Suk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Io...
MMM
2011
Springer
244views Multimedia» more  MMM 2011»
14 years 3 months ago
Shape Stylized Face Caricatures
Facial caricatures exaggerate key features to emphasize unique structural and personality traits. It is quite a challenge to retain the identity of the original person despite the ...
Nguyen Kim Hai Le, Why Yong Peng, Golam Ashraf