Sciweavers

173 search results - page 15 / 35
» Scan Architecture With Align-Encode
Sort
View
CISS
2010
IEEE
13 years 6 days ago
Using laser scanners for modeling and analysis in architecture, engineering, and construction
— Laser scanners are rapidly gaining acceptance as a tool for three dimensional (3D) modeling and analysis in the architecture, engineering, and construction (AEC) domain. Since ...
Daniel Huber, Burcu Akinci, Pingbo Tang, Antonio A...
ICCAD
2004
IEEE
101views Hardware» more  ICCAD 2004»
14 years 5 months ago
Frugal linear network-based test decompression for drastic test cost reductions
— In this paper we investigate an effective approach to construct a linear decompression network in the multiple scan chain architecture. A minimal pin architecture, complemented...
Wenjing Rao, Alex Orailoglu, G. Su
SIGGRAPH
1993
ACM
14 years 19 days ago
Hierarchical Z-buffer visibility
An ideal visibility algorithm should a) quickly reject most of the hidden geometry in a model and b) exploit the spatial and perhaps temporal coherence of the images being generat...
Ned Greene, Michael Kass, Gavin S. P. Miller
ACSAC
2004
IEEE
14 years 10 days ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh
HPCA
2006
IEEE
14 years 9 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...