Sciweavers

434 search results - page 75 / 87
» Improved Algorithms for the 2-Vertex Disjoint Paths Problem
Sort
View
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 2 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
COR
2010
110views more  COR 2010»
14 years 9 months ago
An evolutionary method for complex-process optimization
In this paper we present a new evolutionary method for complex-process optimization. It is partially based on principles of the scatter search methodology, but it makes use of inn...
Jose A. Egea, Rafael Martí, Julio R. Banga
ICCAD
2003
IEEE
219views Hardware» more  ICCAD 2003»
15 years 6 months ago
A Min-Cost Flow Based Detailed Router for FPGAs
Routing for FPGAs has been a very challenging problem due to the limitation of routing resources. Although the FPGA routing problem has been researched extensively, most algorithm...
Seokjin Lee, Yongseok Cheon, Martin D. F. Wong
ICASSP
2011
IEEE
14 years 1 months ago
Compression using self-similarity-based temporal super-resolution for full-exposure-time video
In order to allow sufficient amount of light into the image sensor, videos captured in poor lighting conditions typically have low frame rate and frame exposure time equals to in...
Mihoko Shimano, Gene Cheung, Imari Sato
ISPD
2003
ACM
88views Hardware» more  ISPD 2003»
15 years 2 months ago
Porosity aware buffered steiner tree construction
— In order to achieve timing closure on increasingly complex IC designs, buffer insertion needs to be performed on thousands of nets within an integrated physical synthesis syste...
Charles J. Alpert, Gopal Gandham, Milos Hrkic, Jia...