Sciweavers

2201 search results - page 258 / 441
» Improvement of ASIC Design Processes
Sort
View
WWW
2010
ACM
15 years 11 months ago
Web search/browse log mining: challenges, methods, and applications
Huge amounts of search and browse log data has been accumulated in various search engines. Such massive search/browse log data, on the one hand, provides great opportunities to mi...
Daxin Jiang, Jian Pei, Hang Li
ICPR
2010
IEEE
1103views Computer Vision» more  ICPR 2010»
15 years 11 months ago
Fast Logo Detection and Recognition in Document Images
The scientific significance of automatic logo detection and recognition is more and more growing because of the increasing requirements of intelligent document image analysis an...
Zhe Li, Matthias Schulte-Austum, Martin Neschen
CSCWD
2009
Springer
15 years 11 months ago
Random stimulus generation with self-tuning
Constrained random simulation methodology still plays an important role in hardware verification due to the limited scalability of formal verification, especially for the large an...
Yanni Zhao, Jinian Bian, Shujun Deng, Zhiqiu Kong
ASIAMS
2008
IEEE
15 years 11 months ago
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment
Our previous research illustrated the design of fuzzy logic based online risk assessment for Distributed Intrusion Prediction and Prevention Systems (DIPPS) [3]. Based on the DIPP...
Kjetil Haslum, Ajith Abraham, Svein J. Knapskog
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 11 months ago
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks
—In this paper the performance of unslotted ALOHA and CSMA are analyzed in spatially distributed wireless networks. Users/packets arrive randomly in space and time according to a...
Mariam Kaynia, Nihar Jindal