Sciweavers

182 search results - page 22 / 37
» Enforcing Robust Declassification
Sort
View
DATE
2007
IEEE
94views Hardware» more  DATE 2007»
14 years 1 months ago
Optimization-based wideband basis functions for efficient interconnect extraction
This paper introduces a technique for the numerical generation of basis functions that are capable of parameterizing the frequency-variant nature of cross-sectional conductor curre...
Xin Hu, Tarek Moselhy, Jacob K. White, Luca Daniel
DMIN
2006
105views Data Mining» more  DMIN 2006»
13 years 11 months ago
Structural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
Nasrullah Memon, Henrik Legind Larsen
GRAPHICSINTERFACE
2001
13 years 11 months ago
Watermarking 3D Polygonal Meshes in the Mesh Spectral Domain
Digital watermarking embeds a structure called watermark into the target data, such as image and 3D polygonal models. The watermark can be used, for example, to enforce copyright ...
Ryutarou Ohbuchi, Shigeo Takahashi, Takahiko Miyaz...
LOBJET
2008
104views more  LOBJET 2008»
13 years 9 months ago
Une approche formelle de la reconfiguration dynamique
Self-adapting software adapts its behavior in an autonomic way, by dynamically adding, suppressing and recomposing components, and by the use of computational reflection. One way t...
M. Simonot, M. Aponte
CP
2010
Springer
13 years 8 months ago
A Box-Consistency Contractor Based on Extremal Functions
Abstract. Interval-based methods can approximate all the real solutions of a system of equations and inequalities. The Box interval constraint propagation algorithm enforces Box co...
Gilles Trombettoni, Yves Papegay, Gilles Chabert, ...