Sciweavers

2125 search results - page 336 / 425
» Points with Type-2 Operations
Sort
View
TPDS
2010
260views more  TPDS 2010»
13 years 7 months ago
Real-Time Modeling of Wheel-Rail Contact Laws with System-On-Chip
—This paper presents the development and implementation of a multiprocessor system-on-chip solution for fast and real time simulations of complex and nonlinear wheel-rail contact...
Yongji Zhou, T. X. Mei, Steven Freear
TVCG
2010
118views more  TVCG 2010»
13 years 7 months ago
A Curved Ray Camera for Handling Occlusions through Continuous Multiperspective Visualization
—Most images used in visualization are computed with the planar pinhole camera. This classic camera model has important advantages such as simplicity, which enables efficient sof...
Jian Cui, Paul Rosen, Voicu Popescu, Christoph M. ...
VTC
2010
IEEE
180views Communications» more  VTC 2010»
13 years 7 months ago
Analysis of Enhanced Deployment Models for Sensor Networks
Abstract—We present the estimation and evaluation of deployment models for sensor networks that exploit different amounts of a priori information. Topologies generated from the m...
Frank Oldewurtel, Petri Mähönen
ACSAC
2010
IEEE
13 years 7 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
ASPDAC
2010
ACM
152views Hardware» more  ASPDAC 2010»
13 years 7 months ago
Slack redistribution for graceful degradation under voltage overscaling
Modern digital IC designs have a critical operating point, or "wall of slack", that limits voltage scaling. Even with an errortolerance mechanism, scaling voltage below a...
Andrew B. Kahng, Seokhyeong Kang, Rakesh Kumar, Jo...