Sciweavers

2125 search results - page 311 / 425
» Points with Type-2 Operations
Sort
View
SPW
2000
Springer
14 years 19 days ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
DAC
1995
ACM
14 years 18 days ago
The Validity of Retiming Sequential Circuits
Retiming has been proposed as an optimizationstep forsequential circuits represented at the net-list level. Retiming moves the latches across the logic gates and in doing so chang...
Vigyan Singhal, Carl Pixley, Richard L. Rudell, Ro...
WER
2000
Springer
14 years 18 days ago
Non-Functional Requirements for Object-Oriented Modeling
Recently, it has been pointed out that the majority of the requirements engineering methods do not take into account non-functional requirements (NFRs) [10][11]. Consequently, we h...
Jaime de Melo Sabat Neto, Julio Cesar Sampaio do P...
CDC
2009
IEEE
127views Control Systems» more  CDC 2009»
14 years 11 days ago
A new perspective on control of uncertain complex systems
— In this article, we investigate a new class of control problems called Ensemble Control, a notion coming from the study of complex spin dynamics in Nuclear Magnetic Resonance (...
Shin Li
SGP
2007
13 years 11 months ago
Example-based skeleton extraction
We present a method for extracting a hierarchical, rigid skeleton from a set of example poses. We then use this skeleton to not only reproduce the example poses, but create new de...
Scott Schaefer, Can Yuksel