Sciweavers

2421 search results - page 185 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
153
Voted
VLSID
2002
IEEE
100views VLSI» more  VLSID 2002»
15 years 8 months ago
Layout-Driven Timing Optimization by Generalized De Morgan Transform
We propose a timing-oriented logic optimization technique called Generalized De Morgan (GDM) transform, that integrates gate resizing, net buffering and De Morgan transformation. ...
Supratik Chakraborty, Rajeev Murgai
IVC
2007
91views more  IVC 2007»
15 years 3 months ago
Evolutionary approach to inverse planning in coplanar radiotherapy
A unified evolutionary approach to coplanar radiotherapy inverse planning is proposed. It consists of a genetic algorithm-based framework that solves with little modification tr...
Vitoantonio Bevilacqua, Giuseppe Mastronardi, Gius...
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 9 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
CRV
2009
IEEE
132views Robotics» more  CRV 2009»
15 years 8 months ago
Canine Pose Estimation: A Computing for Public Safety Solution
In this paper we discuss determining canine pose in the context of common poses observed in Urban Search and Rescue dogs through the use a sensor network made up of accelerometers...
Cristina Ribeiro, Alexander Ferworn, Mieso K. Denk...
122
Voted
AUSAI
2007
Springer
15 years 9 months ago
Automated Intelligent Abundance Analysis of Scallop Survey Video Footage
Underwater video is increasingly being pursued as a low impact alternative to traditional techniques (such as trawls and dredges) for determining abundance and size frequency of ta...
Rob Fearn, Raymond Williams, R. Mike Cameron-Jones...