Sciweavers

203 search results - page 11 / 41
» Second-Order Risk Constraints
Sort
View
BIRTHDAY
2011
Springer
12 years 7 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
ASPDAC
2004
ACM
114views Hardware» more  ASPDAC 2004»
14 years 24 days ago
Layer assignment for crosstalk risk minimization
— In ultra-deep submicron technology, crosstalk noise is so severe that crosstalk avoidance merely in detailed routing is not adequate and it has to be considered in earlier desi...
Di Wu, Jiang Hu, Rabi N. Mahapatra, Min Zhao
LICS
2010
IEEE
13 years 5 months ago
The Emptiness Problem for Tree Automata with Global Constraints
We define tree automata with global constraints (TAGC), generalizing the well-known class of tree automata with global equality and disequality constraints [14] (TAGED). TAGC can...
Luis Barguñó, Carles Creus, Guillem ...
ICCV
2011
IEEE
12 years 7 months ago
Trajectory reconstruction from non-overlapping surveillance cameras with relative depth ordering constraints
We present a method for reconstructing a trajectory of an object moving in front of non-overlapping fully or partially calibrated cameras. The non-overlapping setup turns that pro...
Branislav Micusik
ISIPTA
2003
IEEE
14 years 19 days ago
Bounding Analysis of Lung Cancer Risks Using Imprecise Probabilities
For cancers with more than one risk factor, the sum of probabilistic estimates of the number of cancers attributable to each individual factor may exceed the total number of cases...
Minh Ha-Duong, Elizabeth Casman, M. Granger Morgan