Sciweavers

5722 search results - page 955 / 1145
» Security Function Interactions
Sort
View
ICCAD
2007
IEEE
125views Hardware» more  ICCAD 2007»
16 years 15 days ago
A methodology for timing model characterization for statistical static timing analysis
While the increasing need for addressing process variability in sub-90nm VLSI technologies has sparkled a large body of statistical timing and optimization research, the realizati...
Zhuo Feng, Peng Li
ICCAD
2005
IEEE
81views Hardware» more  ICCAD 2005»
16 years 15 days ago
Kauffman networks: analysis and applications
Abstract— A Kauffman network is an abstract model of gene regulatory networks. Each gene is represented by a vertex. An edge from one vertex to another implies that the former ge...
Elena Dubrova, Maxim Teslenko, Andrés Marti...
111
Voted
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
16 years 14 days ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl
130
Voted
CVPR
2010
IEEE
15 years 11 months ago
Locally-Parametric Pictorial Structures
Pictorial structure (PS) models are extensively used for part-based recognition of scenes, people, animals and multi-part objects. To achieve tractability, the structure and param...
Benjamin Sapp, Chris Jordan, Ben Taskar
CGO
2009
IEEE
15 years 10 months ago
OptiScope: Performance Accountability for Optimizing Compilers
Compilers employ many aggressive code transformations to achieve highly optimized code. However, because of complex target architectures and unpredictable optimization interaction...
Tipp Moseley, Dirk Grunwald, Ramesh Peri