Sciweavers

4511 search results - page 728 / 903
» Observation Based System Security
Sort
View
IEEESCC
2009
IEEE
15 years 1 months ago
Theoretical Framework for Eliminating Redundancy in Workflows
In this paper we look at combining and compressing a set of workflows, such that computation can be minimized. In this context, we look at two novel theoretical problems with appl...
Dhrubajyoti Saha, Abhishek Samanta, Smruti R. Sara...
151
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 28 days ago
Evolutionary Approach to Test Generation for Functional BIST
In the paper, an evolutionary approach to test generation for functional BIST is considered. The aim of the proposed scheme is to minimize the test data volume by allowing the dev...
Y. A. Skobtsov, D. E. Ivanov, V. Y. Skobtsov, Raim...
145
Voted
TMC
2011
145views more  TMC 2011»
14 years 10 months ago
MAC Layer Throughput Estimation in Impulse-Radio UWB Networks
—The inherent channel characteristics of impulse-based UWB networks affect the MAC layer performance significantly. Most previous studies on evaluating MAC protocols are based o...
Ioannis Broustis, Aggelos Vlavianos, Prashant Kris...
127
Voted
TOG
2010
118views more  TOG 2010»
14 years 10 months ago
A hierarchical volumetric shadow algorithm for single scattering
Volumetric effects such as beams of light through participating media are an important component in the appearance of the natural world. Many such effects can be faithfully modele...
Ilya Baran, Jiawen Chen, Jonathan Ragan-Kelley, Fr...
122
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Fast estimation of the state of the power grid using synchronized phasor measurements
—Both the communication limitation and the measurement properties based algorithm become the bottleneck of enhancing the traditional power system state estimation speed. The avai...
Tao Yang, Anjan Bose