Sciweavers

950 search results - page 181 / 190
» Constraint Based Resilience Analysis
Sort
View
ESA
2009
Springer
122views Algorithms» more  ESA 2009»
14 years 2 months ago
Bounded Budget Betweenness Centrality Game for Strategic Network Formations
In this paper, we introduce the bounded budget betweenness centrality game, a strategic network formation game in which nodes build connections subject to a budget constraint in or...
Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhan...
CODES
2008
IEEE
14 years 2 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
ICC
2008
IEEE
139views Communications» more  ICC 2008»
14 years 2 months ago
Communications and Sensing of Illumination Contributions in a Power LED Lighting System
— In recent years, LED technology emerged as a prime candidate for the future illumination light source, due to high energy efficiency and long life time. In addition, LEDs offe...
Jean-Paul M. G. Linnartz, Lorenzo Feri, Hongming Y...
DATE
2007
IEEE
86views Hardware» more  DATE 2007»
14 years 1 months ago
Reduction of detected acceptable faults for yield improvement via error-tolerance
Error-tolerance is an innovative way to enhance the effective yield of IC products. Previously a test methodology based on error-rate estimation to support error-tolerance was pro...
Tong-Yu Hsieh, Kuen-Jong Lee, Melvin A. Breuer
PASTE
2005
ACM
14 years 1 months ago
Generalizing symbolic execution to library classes
Forward symbolic execution is a program analysis technique that allows using symbolic inputs to explore program executions. The traditional applications of this technique have foc...
Sarfraz Khurshid, Yuk Lai Suen