Sciweavers

5799 search results - page 203 / 1160
» Position Paper
Sort
View
DAC
2009
ACM
16 years 4 months ago
Spare-cell-aware multilevel analytical placement
Post-silicon validation has recently drawn designers' attention due to its increasing impacts on the VLSI design cycle and cost. One key feature of the post-silicon validatio...
Zhe-Wei Jiang, Meng-Kai Hsu, Yao-Wen Chang, Kai-Yu...
ISBI
2004
IEEE
16 years 4 months ago
A Novel Closed Form Solution for Ultrasound Calibration
This paper describes a new robust method for calibration of ultrasound probe (2D/3D). Prior to calibration, a position sensor is attached to the probe for tagging each image/volum...
Emad Boctor, Anand Viswanathan, Michael A. Choti, ...
WWW
2009
ACM
16 years 4 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
112
Voted
EDBT
2004
ACM
94views Database» more  EDBT 2004»
16 years 3 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang
EWSN
2007
Springer
16 years 3 months ago
Removing Systematic Error in Node Localisation Using Scalable Data Fusion
Methods for node localisation in sensor networks usually rely upon the measurement of received strength, time-of-arrival, and/or angle-of-arrival of an incoming signal. In this pap...
Albert Krohn, Mike Hazas, Michael Beigl