Sciweavers

1639 search results - page 301 / 328
» Degree-constrained network flows
Sort
View
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
14 years 2 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
INFOCOM
1996
IEEE
14 years 2 months ago
Group Priority Scheduling
We present an end-to-end delay guarantee theorem for a class of guaranteed-deadline (GD) servers. The theorem can be instantiated to obtain end-to-end delay bounds for a variety of...
Simon S. Lam, Geoffrey G. Xie
ASPDAC
2009
ACM
141views Hardware» more  ASPDAC 2009»
14 years 1 months ago
Adaptive inter-router links for low-power, area-efficient and reliable Network-on-Chip (NoC) architectures
Abstract-- The increasing wire delay constraints in deep submicron VLSI designs have led to the emergence of scalable and modular Network-on-Chip (NoC) architectures. As the power ...
Avinash Karanth Kodi, Ashwini Sarathy, Ahmed Louri...
EMMCVPR
2007
Springer
14 years 1 months ago
Efficient Shape Matching Via Graph Cuts
Abstract. Meaningful notions of distance between planar shapes typically involve the computation of a correspondence between points on one shape and points on the other. To determi...
Frank R. Schmidt, Eno Töppe, Daniel Cremers, ...
DAC
2009
ACM
14 years 1 months ago
RegPlace: a high quality open-source placement framework for structured ASICs
Structured ASICs have recently emerged as an exciting alternative to ASIC or FPGA design style as they provide a new trade-off between the high performance of ASIC design and low ...
Ashutosh Chakraborty, Anurag Kumar, David Z. Pan