Sciweavers

5344 search results - page 344 / 1069
» Privacy-Preserving Set Operations
Sort
View
120
Voted
ICCAD
2000
IEEE
77views Hardware» more  ICCAD 2000»
15 years 9 months ago
Improving the Proportion of At-Speed Tests in Scan BIST
A method to select the lengths of functional sequences in a BIST scheme for scan designs is proposed in this paper. A functional sequence is a sequence of primary input vectors ap...
Yu Huang, Irith Pomeranz, Sudhakar M. Reddy, Janus...
DEXAW
1999
IEEE
120views Database» more  DEXAW 1999»
15 years 9 months ago
Dynamic Data Delivery to Mobile Users
We propose an information push model information dissemination to mobile users, called dynamic channel model. It is a set of extensions to the conceptual models developed for info...
Ana Paula Afonso, Francisco S. Regateiro, Má...
ICRA
1999
IEEE
65views Robotics» more  ICRA 1999»
15 years 9 months ago
A General Framework for Cobot Control
A general framework is presented for the design and analysis of cobot controllers. Cobots are inherently passive robots intended for direct collaborative work with a human operator...
R. Brent Gillespie, J. Edward Colgate, Michael A. ...
AUSAI
1999
Springer
15 years 9 months ago
Minimal Belief Change and Pareto-Optimality
This paper analyzes the notion of a minimal belief change that incorporates new information. I apply the fundamental decisiontheoretic principle of Pareto-optimality to derive a no...
Oliver Schulte
SIBGRAPI
1999
IEEE
15 years 9 months ago
Developing Morphological Building Blocks: From Design to Implementation
Abstract. Mathematical morphology has become a widely used technique for image processing and computer vision. Initially designed as a set theory, it was generalized to the set of ...
Marcos Cordeiro d'Ornellas, Rein van den Boomgaard