Sciweavers

2932 search results - page 439 / 587
» Higher order mining
Sort
View
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
14 years 3 months ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi
SIGGRAPH
1994
ACM
14 years 2 months ago
Drawing and animation using skeletal strokes
strokes makes it particularly attractive in terms of storage size and transmission efficiency. Its efficient implementation is favourable for incorporation into windowing systems a...
Siu Chi Hsu, Irene H. H. Lee
UIST
1993
ACM
14 years 2 months ago
Skeletal Strokes
A skeletal stroke is a kind of general brush stroke for changing the shape of pictures as if by bending, shearing, twisting, while conservating the aspect ratio of selected featur...
S. C. Hsu, I. H. H. Lee, Neil E. Wiseman
VLDB
1992
ACM
161views Database» more  VLDB 1992»
14 years 2 months ago
Performance and Scalability of Client-Server Database Architectures
Recent developments in software and hardware changed the way database systems are built and operate. In this paper we present database architectures based on the Client Server par...
Alex Delis, Nick Roussopoulos
RTSS
1989
IEEE
14 years 2 months ago
A Distributed Fault Tolerant Architecture for Nuclear Reactor Control and Safety Functions
A new fault tolerant architecture that provides tolerance to a broad scope of hardware, software, and communications faults is being developed. This architecture relies on widely ...
Myron Hecht, J. Agron, S. Hochhauser