Sciweavers

96 search results - page 13 / 20
» A Methodology to Improve Dependability in Spreadsheets
Sort
View
ICCAD
2004
IEEE
107views Hardware» more  ICCAD 2004»
14 years 6 months ago
Computation of signal threshold crossing times directly from higher order moments
—This paper introduces a simple method for calculating the times at which any signal crosses a prespecified threshold voltage (e.g., 10%, 20%, 50%, etc.) directly from the moment...
Yehea I. Ismail, Chirayu S. Amin
ICCAD
2001
IEEE
113views Hardware» more  ICCAD 2001»
14 years 6 months ago
Compact Modeling and SPICE-Based Simulation for Electrothermal Analysis of Multilevel ULSI Interconnects
This paper presents both compact analytical models and fast SPICE based 3-D electro-thermal simulation methodology to characterize thermal effects due to Joule heating in high per...
TingYen Chiang, Kaustav Banerjee, Krishna Saraswat
ICASSP
2009
IEEE
14 years 3 months ago
Multi-flow attack resistant watermarks for network flows
In this work we present a Multi-flow Attack Resistant Interval Centroid Based Watermarking (MAR-ICBW) scheme for network flows. Our proposed scheme can withstand the newly intro...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
14 years 3 months ago
An experimental analysis of evolution strategies and particle swarm optimisers using design of experiments
The success of evolutionary algorithms (EAs) depends crucially on finding suitable parameter settings. Doing this by hand is a very time consuming job without the guarantee to ...
Oliver Kramer, Bartek Gloger, Andreas Goebels
VOTEID
2007
Springer
14 years 3 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...