Sciweavers

4679 search results - page 887 / 936
» Modeling When Connections Are the Problem
Sort
View
CHI
2002
ACM
15 years 10 months ago
Direct manipulation interface for architectural design tools
The early architectural design stage is a typical example where traditional design tools such as sketching on paper still dominate over computer-assisted tools. Augmented reality ...
Dzmitry Aliakseyeu
ICCAD
2004
IEEE
158views Hardware» more  ICCAD 2004»
15 years 6 months ago
DAOmap: a depth-optimal area optimization mapping algorithm for FPGA designs
In this paper we study the technology mapping problem for FPGA architectures to minimize chip area, or the total number of lookup tables (LUTs) of the mapped design, under the chi...
Deming Chen, Jason Cong
SERSCISA
2009
Springer
15 years 4 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
ISBRA
2010
Springer
15 years 4 months ago
Uncovering Hidden Phylogenetic Consensus
Abstract. Many of the steps in phylogenetic reconstruction can be confounded by “rogue” taxa, taxa that cannot be placed with assurance anywhere within the tree—whose locatio...
Nicholas D. Pattengale, Krister M. Swenson, Bernar...
CDC
2008
IEEE
109views Control Systems» more  CDC 2008»
15 years 4 months ago
MPC for tracking with optimal closed-loop performance
— This paper deals with the tracking problem for constrained linear systems using a model predictive control (MPC) law. As it is well known, MPC provides a control law suitable f...
Antonio Ferramosca, Daniel Limón, Ignacio A...