Sciweavers

21 search results - page 3 / 5
» Model-Based Analysis of Configuration Vulnerabilities
Sort
View
107
Voted
ICPPW
2006
IEEE
15 years 7 months ago
Model-Based OpenMP Implementation of a 3D Facial Pose Tracking System
Abstract— Most image processing applications are characterized by computation-intensive operations, and high memory and performance requirements. Parallelized implementation on s...
Sankalita Saha, Chung-Ching Shen, Chia-Jui Hsu, Ga...
99
Voted
WSC
2008
15 years 3 months ago
Automated generation and parameterization of throughput models for semiconductor tools
Cluster tools play an important role in modern semiconductor fabs. Due to their complexity in configuration and their varying material flow, the creation of accurate throughput mo...
Jan Lange, Kilian Schmidt, Roy Borner, Oliver Rose
107
Voted
BROADNETS
2007
IEEE
15 years 7 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
101
Voted
MICCAI
2004
Springer
15 years 6 months ago
Statistical Shape Modelling of the Levator Ani with Thickness Variation
The levator ani is vulnerable to injury during childbirth and effective surgical intervention requires full knowledge of the morphology and mechanical properties of the muscle stru...
Su-Lin Lee, Paramate Horkaew, Ara Darzi, Guang-Zho...
101
Voted
COMCOM
2008
72views more  COMCOM 2008»
15 years 1 months ago
Stochastic analysis of the interplay between object maintenance and churn
Due to the prevalence of peer dynamics (i.e., churn), object maintenance becomes a fundamental issue in peer-to-peer storage systems. Although quite a few prototypes have been des...
Di Wu, Ye Tian, Kam-Wing Ng, Anwitaman Datta