Sciweavers

694 search results - page 68 / 139
» Overcoming Challenges of Maturity
Sort
View
ICCAD
2004
IEEE
155views Hardware» more  ICCAD 2004»
15 years 8 months ago
A flexibility aware budgeting for hierarchical flow timing closure
—In this paper, we present a new block budgeting algorithm which speeds up timing closure in timing driven hierarchical flows. After a brief description of the addressed flow, ...
Olivier Omedes, Michel Robert, Mohammed Ramdani
SIGUCCS
2005
ACM
15 years 5 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
VSTTE
2005
Springer
15 years 5 months ago
From the How to the What
In this paper, we consider the Grand Challenge under a very specific perspective: the enabling of application experts without programming knowledge to reliably model their busines...
Tiziana Margaria, Bernhard Steffen
NETWORK
2007
167views more  NETWORK 2007»
14 years 11 months ago
Sensor Localization under Limited Measurement Capabilities
If we abstract a sensor network as a network graph consisting of vertices and edges, where vertices represent sensor nodes and edges represent distance measurements between neighbo...
Chen Wang, Li Xiao
CVPR
2008
IEEE
16 years 1 months ago
Robust 3D face recognition in uncontrolled environments
Most current 3D face recognition algorithms are designed based on the data collected in controlled situations, which leads to the un-guaranteed performance in practical systems. I...
Cheng Zhong, Zhenan Sun, Tieniu Tan, Zhaofeng He