Sciweavers

21 search results - page 3 / 5
» Model-Based Analysis of Configuration Vulnerabilities
Sort
View
ICPPW
2006
IEEE
14 years 13 days ago
Model-Based OpenMP Implementation of a 3D Facial Pose Tracking System
Abstract— Most image processing applications are characterized by computation-intensive operations, and high memory and performance requirements. Parallelized implementation on s...
Sankalita Saha, Chung-Ching Shen, Chia-Jui Hsu, Ga...
WSC
2008
13 years 8 months ago
Automated generation and parameterization of throughput models for semiconductor tools
Cluster tools play an important role in modern semiconductor fabs. Due to their complexity in configuration and their varying material flow, the creation of accurate throughput mo...
Jan Lange, Kilian Schmidt, Roy Borner, Oliver Rose
BROADNETS
2007
IEEE
14 years 22 days ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
MICCAI
2004
Springer
13 years 11 months ago
Statistical Shape Modelling of the Levator Ani with Thickness Variation
The levator ani is vulnerable to injury during childbirth and effective surgical intervention requires full knowledge of the morphology and mechanical properties of the muscle stru...
Su-Lin Lee, Paramate Horkaew, Ara Darzi, Guang-Zho...
COMCOM
2008
72views more  COMCOM 2008»
13 years 6 months ago
Stochastic analysis of the interplay between object maintenance and churn
Due to the prevalence of peer dynamics (i.e., churn), object maintenance becomes a fundamental issue in peer-to-peer storage systems. Although quite a few prototypes have been des...
Di Wu, Ye Tian, Kam-Wing Ng, Anwitaman Datta