This paper addresses the problem of design rule correct routing, i.e. the avoidance of illegal wiring patterns during routing. These illegal wiring patterns are due to the set of ...
Ed P. Huijbregts, Jos T. J. van Eijndhoven, Jochen...
Our previous research on one-probe access to large collections of data indexed by alphanumeric keys has produced the first practical minimal perfect hash functions for this proble...
Information integration in enterprises is a nightmare due to the differences in software and hardware platforms and due to syntactic and semantic differences in the schemas of the...
We propose an algorithm to detect depths in a light field. Specifically, given a 4D light field, we find all planes at which objects are located. Although the exact depth of each ...
Yi-Hao Kao, Chia-Kai Liang, Li-Wen Chang, Homer H....
One of the most important issues for ubiquitous computing is the problem of encrypting content in the devices, as the heterogeneity in the devices nature, capabilities, mobility an...