Sciweavers

5093 search results - page 1013 / 1019
» How Real are Real Numbers
Sort
View
TCAD
2010
136views more  TCAD 2010»
13 years 2 months ago
Bounded Model Debugging
Design debugging is a major bottleneck in modern VLSI design flows as both the design size and the length of the error trace contribute to its inherent complexity. With typical des...
Brian Keng, Sean Safarpour, Andreas G. Veneris
TITB
2010
120views Education» more  TITB 2010»
13 years 2 months ago
A distributed, collaborative intelligent agent system approach for proactive postmarketing drug safety surveillance
Discovering unknown adverse drug reactions (ADRs) in postmarketing surveillance as early as possible is of great importance. The current approach to postmarketing surveillance prim...
Yanqing Ji, Hao Ying, Margo S. Farber, John Yen, P...
TON
2010
171views more  TON 2010»
13 years 2 months ago
Offline Routing and Wavelength Assignment in Transparent WDM Networks
We consider the offline version of the routing and wavelength assignment (RWA) problem in transparent all-optical networks. In such networks and in the absence of regenerators, the...
Konstantinos Christodoulopoulos, Konstantinos Mano...
CVPR
2011
IEEE
12 years 11 months ago
Learning-based Hypothesis Fusion for Robust Catheter Tracking in 2D X-ray Fluoroscopy
Catheter tracking has become more and more important in recent interventional applications. It provides real time guidance for the physicians and can be used as motion compensated...
Wen Wu, Terrence Chen, Adrian Barbu, Peng Wang, No...
ICASSP
2011
IEEE
12 years 11 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
« Prev « First page 1013 / 1019 Last » Next »