Sciweavers

222 search results - page 14 / 45
» Enterprise Architecture Analysis for Data Accuracy Assessmen...
Sort
View
ETS
2011
IEEE
224views Hardware» more  ETS 2011»
12 years 7 months ago
AVF Analysis Acceleration via Hierarchical Fault Pruning
—The notion of Architectural Vulnerability Factor (AVF) has been extensively used by designers to evaluate various aspects of design robustness. While AVF is a very accurate way ...
Michail Maniatakos, Chandra Tirumurti, Abhijit Jas...
FCSC
2007
108views more  FCSC 2007»
13 years 7 months ago
Offline Chinese handwriting recognition: an assessment of current technology
Offline Chinese handwriting recognition (OCHR) is a typically difficult pattern recognition problem. Many authors have presented various approaches to recognizing its different asp...
Sargur N. Srihari, Xuanshen Yang, Gregory R. Ball
IHI
2012
287views Healthcare» more  IHI 2012»
12 years 3 months ago
MARHS: mobility assessment system with remote healthcare functionality for movement disorders
Due to the global trend of aging societies with increasing demand for low cost and high quality healthcare services, there has been extensive research and development directed tow...
Sunghoon Ivan Lee, Jonathan Woodbridge, Ani Nahape...
ICMCS
2008
IEEE
158views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Video quality assessment and comparative evaluation of peer-to-peer video streaming systems
We design a test methodology to analyze in detail the video quality received at each peer in a peer-to-peer (P2P) video streaming system. The metrics that we employ at each peer i...
Aditya Mavlankar, Pierpaolo Baccichet, Bernd Girod...
DAC
1998
ACM
13 years 12 months ago
Adjoint Transient Sensitivity Computation in Piecewise Linear Simulation
This paper presents a general method for computing transient sensitivities using the adjoint method in event driven simulation algorithms that employ piecewise linear device model...
Tuyen V. Nguyen, Anirudh Devgan, Ognen J. Nastov