Sciweavers

2421 search results - page 182 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
109
Voted
EJWCN
2010
122views more  EJWCN 2010»
14 years 10 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...
122
Voted
VISUALIZATION
2005
IEEE
15 years 9 months ago
Marching Diamonds for Unstructured Meshes
We present a higher-order approach to the extraction of isosurfaces from unstructured meshes. Existing methods use linear interpolation along each mesh edge to find isosurface in...
John C. Anderson, Janine Bennett, Kenneth I. Joy
ISSS
1999
IEEE
151views Hardware» more  ISSS 1999»
15 years 7 months ago
Optimized System Synthesis of Complex RT Level Building Blocks from Multirate Dataflow Graphs
In order to cope with the ever increasing complexity of todays application specific integrated circuits, a building block based design methodology is established. The system is co...
Jens Horstmannshoff, Heinrich Meyr
141
Voted
SEMCO
2009
IEEE
15 years 10 months ago
Enhanced Multimedia Content Access and Exploitation Using Semantic Speech Retrieval
—Techniques for automatic annotation of spoken content making use of speech recognition technology have long been characterized as holding unrealized promise to provide access to...
Roeland Ordelman, Franciska de Jong, Martha Larson
120
Voted
DOLAP
2000
ACM
15 years 8 months ago
Analyzing Clickstreams Using Subsessions
Analyzing data obtained from web server logs, so-called “clickstreams”, is rapidly becoming one of the most important activities for companies in any sector as most businesses...
Jesper Andersen, Anders Giversen, Allan H. Jensen,...