Sciweavers

4752 search results - page 874 / 951
» From computation models to models of provenance: the RWS app...
Sort
View
SENSYS
2006
ACM
14 years 2 months ago
Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms
We explore fundamental performance limits of tracking a target in a two-dimensional field of binary proximity sensors, and design algorithms that attain those limits. In particul...
Nisheeth Shrivastava, Raghuraman Mudumbai, Upamany...
DATE
2003
IEEE
135views Hardware» more  DATE 2003»
14 years 2 months ago
Creating Value Through Test
Test is often seen as a necessary evil; it is a fact of life that ICs have manufacturing defects and those need to be filtered out by testing before the ICs are shipped to the cu...
Erik Jan Marinissen, Bart Vermeulen, Robert Madge,...
KDD
2000
ACM
211views Data Mining» more  KDD 2000»
14 years 13 days ago
Mining IC test data to optimize VLSI testing
We describe an application of data mining and decision analysis to the problem of die-level functional test in integrated circuit manufacturing. Integrated circuits are fabricated...
Tony Fountain, Thomas G. Dietterich, Bill Sudyka
IEEESP
2007
98views more  IEEESP 2007»
13 years 8 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
WSCG
2003
327views more  WSCG 2003»
13 years 10 months ago
Image Recoloring Induced by Palette Color Associations
In this paper we present a non-interactive method for recoloring a destination image according to the color scheme found in a source image. The approach is motivated by trying to ...
G. R. Greenfield, D. H. House