Sciweavers

11328 search results - page 2032 / 2266
» Timed Branching Processes
Sort
View
137
Voted
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
16 years 28 days ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal
130
Voted
EUROSYS
2008
ACM
16 years 25 days ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
145
Voted
EUROGRAPHICS
2010
Eurographics
16 years 25 days ago
Adding Depth to Cartoons Using Sparse Depth (In)equalities
This paper presents a novel interactive approach for adding depth information into hand-drawn cartoon images and animations. In comparison to previous depth assignment techniques ...
Daniel Sýkora, David Sedlacek, Sun Jinchao, John ...
123
Voted
ICCAD
2003
IEEE
145views Hardware» more  ICCAD 2003»
16 years 19 days ago
Manufacturing-Aware Physical Design
Ultra-deep submicron manufacturability impacts physical design (PD) through complex layout rules and large guardbands for process variability; this creates new requirements for ne...
Puneet Gupta, Andrew B. Kahng
162
Voted
ICCAD
2003
IEEE
175views Hardware» more  ICCAD 2003»
16 years 19 days ago
Path Delay Estimation using Power Supply Transient Signals: A Comparative Study using Fourier and Wavelet Analysis
Transient Signal Analysis (TSA) is a parametric device testing technique based on the analysis of dynamic (transient) current (iDDT) drawn by the core logic from the power supply ...
Abhishek Singh, Jitin Tharian, Jim Plusquellic
« Prev « First page 2032 / 2266 Last » Next »