Sciweavers

2654 search results - page 512 / 531
» On Pairing Inversion Problems
Sort
View
95
Voted
EUROPAR
2001
Springer
15 years 5 months ago
Building TMR-Based Reliable Servers Despite Bounded Input Lifetimes
This paper is on the construction of a server subsystem in a client/server system in an application context where the number of potential clients can be arbitrarily large. The imp...
Paul D. Ezhilchelvan, Jean-Michel Hélary, M...
91
Voted
IWANN
2001
Springer
15 years 5 months ago
Is Neural Network a Reliable Forecaster on Earth? A MARS Query!
: Long-term rainfall prediction is a challenging task especially in the modern world where we are facing the major environmental problem of global warming. In general, climate and ...
Ajith Abraham, Dan Steinberg
ACSAC
2000
IEEE
15 years 5 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
104
Voted
SIGGRAPH
1999
ACM
15 years 5 months ago
Multiresolution Mesh Morphing
We present a new method for user controlled morphing of two homeomorphic triangle meshes of arbitrary topology. In particular we focus on the problem of establishing a corresponde...
Aaron W. F. Lee, David P. Dobkin, Wim Sweldens, Pe...
75
Voted
ICCAD
1999
IEEE
66views Hardware» more  ICCAD 1999»
15 years 5 months ago
Timing-safe false path removal for combinational modules
A delay abstraction of a combinational module is a compact representation of the delay information of the module, which carries effective pin-to-pin delay for each primary-input/pr...
Yuji Kukimoto, Robert K. Brayton