Sciweavers

811 search results - page 127 / 163
» Avoiding Approximate Squares
Sort
View
ICC
2007
IEEE
14 years 3 months ago
Toward Valley-Free Inter-domain Routing
ASes in inter-domain routing receive little information about the quality of the routes they receive. This lack of information can lead to inefficient and even incorrect routing....
Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monro...
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
14 years 3 months ago
Learning What Makes a Society Tick
We present a machine learning methodology (models, algorithms, and experimental data) to discovering the agent dynamics that drive the evolution of the social groups in a communit...
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Is...
SMI
2007
IEEE
139views Image Analysis» more  SMI 2007»
14 years 3 months ago
Texture Atlas Generation for Inconsistent Meshes and Point Sets
In order to compute texture atlases with low stretch and hardly visible texture seams existing texture mapping tools pose high demands on the quality of surface representations li...
Patrick Degener, Reinhard Klein
ACSD
2007
IEEE
67views Hardware» more  ACSD 2007»
14 years 3 months ago
Hazard Checking of Timed Asynchronous Circuits Revisited
This paper proposes a new approach for the hazard checking of timed asynchronous circuits. Previous papers proposed either exact algorithms, which suffer from statespace explosion...
Frédéric Béal, Tomohiro Yoned...
ISW
2007
Springer
14 years 3 months ago
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
NLS is a stream cipher which was submitted to eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called as Crossword Puzzle at...
Joo Yeon Cho, Josef Pieprzyk