Sciweavers

2421 search results - page 30 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
108
Voted
ASPDAC
2005
ACM
130views Hardware» more  ASPDAC 2005»
15 years 2 months ago
Stability analysis of active clock deskewing systems using a control theoretic approach
— In this paper, a methodology for analyzing closed loop clock distribution and active deskewing networks is proposed. An active clock distribution and deskewing network is model...
Vinil Varghese, Tom Chen, Peter Young
106
Voted
ICCV
1999
IEEE
16 years 2 months ago
An Integrated Bayesian Approach to Layer Extraction from Image Sequences
This paper describes a Bayesian approach for modeling 3D scenes as a collection of approximately planar layers that are arbitrarily positioned and oriented in the scene. In contra...
Philip H. S. Torr, Richard Szeliski, P. Anandan
102
Voted
IEEEARES
2009
IEEE
15 years 7 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
102
Voted
WSCG
2004
139views more  WSCG 2004»
15 years 2 months ago
Objects Matching Improvement Using Optimization Techniques in a Geometric Modal Methodology
This work was based on a previously developed methodology using shape modal description for matching image objects. With this methodology, the objects points were matched using a ...
Luísa Ferreira Bastos, João Manuel R...
101
Voted
ANNS
2007
15 years 2 months ago
Direct and indirect classification of high-frequency LNA performance using machine learning techniques
The task of determining low noise amplifier (LNA) high-frequency performance in functional testing is as challenging as designing the circuit itself due to the difficulties associa...
Peter C. Hung, Seán F. McLoone, Magdalena S...