Sciweavers

1799 search results - page 96 / 360
» Design considerations for MRAM
Sort
View
JNW
2008
118views more  JNW 2008»
15 years 2 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
ICIP
2010
IEEE
15 years 2 months ago
Wavelet-based image compression anti-forensics
Because digital images can be modified with relative ease, considerable effort has been spent developing image forensic algorithms capable of tracing an image's processing hi...
Matthew C. Stamm, K. J. Ray Liu
FM
2009
Springer
171views Formal Methods» more  FM 2009»
15 years 11 months ago
Formal Management of CAD/CAM Processes
Abstract. Systematic engineering design processes have many aspects in common with software engineering, with CAD/CAM objects replacing program code as the implementation stage of ...
Michael Kohlhase, Johannes Lemburg, Lutz Schrö...
DOLAP
2009
ACM
15 years 11 months ago
A comprehensive approach to data warehouse testing
Testing is an essential part of the design life-cycle of any software product. Nevertheless, while most phases of data warehouse design have received considerable attention in the...
Matteo Golfarelli, Stefano Rizzi
152
Voted
ICANN
2001
Springer
15 years 9 months ago
A Computational Intelligence Approach to Optimization with Unknown Objective Functions
In many practical engineering design problems, the form of objective function is not given explicitly in terms of design variables. Given the value of design variables, under this ...
Hirotaka Nakayama, Masao Arakawa, Rie Sasaki