Sciweavers

12289 search results - page 2215 / 2458
» computing 2006
Sort
View
COR
2008
60views more  COR 2008»
15 years 3 months ago
Heuristic and exact algorithms for generating homogenous constrained three-staged cutting patterns
An approach is proposed for generating homogenous three-staged cutting patterns for the constrained two-dimensional guillotinecutting problems of rectangles. It is based on branch...
Yaodong Cui
ET
2008
92views more  ET 2008»
15 years 3 months ago
Hardware and Software Transparency in the Protection of Programs Against SEUs and SETs
Processor cores embedded in systems-on-a-chip (SoCs) are often deployed in critical computations, and when affected by faults they may produce dramatic effects. When hardware harde...
Eduardo Luis Rhod, Carlos Arthur Lang Lisbôa...
ISCI
2008
104views more  ISCI 2008»
15 years 3 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
JEI
2008
128views more  JEI 2008»
15 years 3 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
OIR
2008
87views more  OIR 2008»
15 years 3 months ago
E-science and information services: a missing link in the context of digital libraries
: Purpose: This paper analysis if and how far Library and Information Services (LIS) are supporting E-Science and Grid-Computing projects funded by authorities in the EU and German...
Achim Osswald
« Prev « First page 2215 / 2458 Last » Next »