Sciweavers

2421 search results - page 30 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ASPDAC
2005
ACM
130views Hardware» more  ASPDAC 2005»
14 years 28 days ago
Stability analysis of active clock deskewing systems using a control theoretic approach
— In this paper, a methodology for analyzing closed loop clock distribution and active deskewing networks is proposed. An active clock distribution and deskewing network is model...
Vinil Varghese, Tom Chen, Peter Young
ICCV
1999
IEEE
15 years 26 days ago
An Integrated Bayesian Approach to Layer Extraction from Image Sequences
This paper describes a Bayesian approach for modeling 3D scenes as a collection of approximately planar layers that are arbitrarily positioned and oriented in the scene. In contra...
Philip H. S. Torr, Richard Szeliski, P. Anandan
IEEEARES
2009
IEEE
14 years 5 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
WSCG
2004
139views more  WSCG 2004»
14 years 10 days ago
Objects Matching Improvement Using Optimization Techniques in a Geometric Modal Methodology
This work was based on a previously developed methodology using shape modal description for matching image objects. With this methodology, the objects points were matched using a ...
Luísa Ferreira Bastos, João Manuel R...
ANNS
2007
14 years 12 days ago
Direct and indirect classification of high-frequency LNA performance using machine learning techniques
The task of determining low noise amplifier (LNA) high-frequency performance in functional testing is as challenging as designing the circuit itself due to the difficulties associa...
Peter C. Hung, Seán F. McLoone, Magdalena S...