Sciweavers

2410 search results - page 362 / 482
» Multiset Ordering Constraints
Sort
View
SAC
2010
ACM
15 years 10 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
3DIM
2003
IEEE
15 years 10 months ago
A Hierarchical Method for Aligning Warped Meshes
Current alignment algorithms for registering range data captured from a 3D scanner assume that the range data depicts identical geometry taken from different views. However, in th...
Leslie Ikemoto, Natasha Gelfand, Marc Levoy
ATS
2003
IEEE
131views Hardware» more  ATS 2003»
15 years 10 months ago
Software-Based Delay Fault Testing of Processor Cores
Software-based self-testing is a promising approach for the testing of processor cores which are embedded inside a System-on-a-Chip (SoC), as it can apply test vectors in function...
Virendra Singh, Michiko Inoue, Kewal K. Saluja, Hi...
DATE
2003
IEEE
69views Hardware» more  DATE 2003»
15 years 10 months ago
Performance-Directed Retiming for FPGAs Using Post-Placement Delay Information
In today’s deep-submicron designs, the interconnect delays contribute an increasing part to the overall performance of an implementation. Particularly when targeting field prog...
Ulrich Seidl, Klaus Eckl, Frank M. Johannes
DFT
2003
IEEE
64views VLSI» more  DFT 2003»
15 years 10 months ago
Hybrid BIST Time Minimization for Core-Based Systems with STUMPS Architecture
1 This paper presents a solution to the test time minimization problem for core-based systems that contain sequential cores with STUMPS architecture. We assume a hybrid BIST approa...
Gert Jervan, Petru Eles, Zebo Peng, Raimund Ubar, ...