Sciweavers

3555 search results - page 502 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ADL
1998
Springer
189views Digital Library» more  ADL 1998»
15 years 9 months ago
Semantic Relations in a Medical Digital Library
ct In this paper, we describe the VesaliusTM Project, a multi-modal collection of anatomical resourcesunder development at Columbia University. 1 Our focus is on the need for navig...
Nina Wacholder, Celina Imielinska, Judith Klavans,...
CASES
2006
ACM
15 years 11 months ago
Adapting compilation techniques to enhance the packing of instructions into registers
The architectural design of embedded systems is becoming increasingly idiosyncratic to meet varying constraints regarding energy consumption, code size, and execution time. Tradit...
Stephen Hines, David B. Whalley, Gary S. Tyson
JIRS
2002
137views more  JIRS 2002»
15 years 5 months ago
Mobile Robot Command by Man-Machine Co-Operation - Application to Disabled and Elderly People Assistance
Disabled people assistance is developing thanks to progress of new technologies. A manipulator arm mounted on a mobile robot can assist the disabled person for the partial restora...
Philippe Hoppenot, Etienne Colle
DAC
2006
ACM
16 years 6 months ago
Novel full-chip gridless routing considering double-via insertion
As the technology node advances into the nanometer era, via-open defects are one of the dominant failures. To improve via yield and reliability, redundant-via insertion is a highl...
Huang-Yu Chen, Mei-Fang Chiang, Yao-Wen Chang, Lum...
CSCWD
2001
Springer
15 years 10 months ago
Update Algorithms for the Sketch Data Model
The authors have developed a new approach to database interoperability using the sketch data model. That technique has now been used in a number of applications, but an important ...
Michael Johnson, Robert D. Rosebrugh