Sciweavers

4763 search results - page 134 / 953
» On the Execution of Deep Models
Sort
View
ISQED
2010
IEEE
151views Hardware» more  ISQED 2010»
15 years 6 months ago
Leakage temperature dependency modeling in system level analysis
Abstract— As the semiconductor technology continues its marching toward the deep sub-micron domain, the strong relation between leakage current and temperature becomes critical i...
Huang Huang, Gang Quan, Jeffrey Fan
IEEEARES
2009
IEEE
15 years 6 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
SIAMREV
2011
40views more  SIAMREV 2011»
14 years 2 months ago
A Mathematical Model for the Control and Eradication of a Wood Boring Beetle Infestation
We propose a mathematical model for an infestation of a wooded area by a beetle species in which the larvae develop deep in the wood of living trees. Due to the difficulties of det...
Stephen A. Gourley, Xingfu Zou
ECCV
2002
Springer
16 years 1 months ago
Understanding and Modeling the Evolution of Critical Points under Gaussian Blurring
Abstract. In order to investigate the deep structure of Gaussian scale space images, one needs to understand the behaviour of critical points under the influence of parameter-drive...
Arjan Kuijper, Luc Florack