Sciweavers

3031 search results - page 283 / 607
» Investigating human-computer optimization
Sort
View
ICCD
2004
IEEE
106views Hardware» more  ICCD 2004»
16 years 1 months ago
Gate Sizing and V{t} Assignment for Active-Mode Leakage Power Reduction
Leakage current is a key factor in IC power consumption even in the active operating mode. We investigate the simultaneous optimization of gate size and threshold voltage to reduc...
Feng Gao, John P. Hayes
ICCAD
2003
IEEE
98views Hardware» more  ICCAD 2003»
16 years 1 months ago
Achieving Design Closure Through Delay Relaxation Parameter
Current design automation methodologies are becoming incapable of achieving design closure especially in the presence of deep submicron effects. This paper addresses the issue of ...
Ankur Srivastava, Seda Ogrenci Memik, Bo-Kyung Cho...
ICASSP
2009
IEEE
15 years 11 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
ICC
2007
IEEE
118views Communications» more  ICC 2007»
15 years 10 months ago
Single and Multiple Parameters Sensitivity Study of Location Management Area Partitioning for GSM Networks
–- To obtain optimal location area (LA) partitioning in cellular radio networks is important since it maximizes the usable bandwidth to support services. However, we feel that th...
Yong Huat Chew, Boon Sain Yeo, Daniel Chien Ming K...
ICNP
2007
IEEE
15 years 10 months ago
Lexicographic products in metarouting
— Routing protocols often keep track of multiple route metrics, where some metrics are more important than others. Route selection is then based on lexicographic comparison: the ...
Alexander J. T. Gurney, Timothy G. Griffin