Sciweavers

435 search results - page 44 / 87
» The Design, Implementation, and Use of the Ngram Statistics ...
Sort
View
CN
2004
109views more  CN 2004»
13 years 7 months ago
Modeling correlations in web traces and implications for designing replacement policies
A number of web cache-related algorithms, such as replacement and prefetching policies, rely on specific characteristics present in the sequence of requests for efficient performa...
Konstantinos Psounis, An Zhu, Balaji Prabhakar, Ra...
ICIP
2003
IEEE
14 years 9 months ago
Robust object boundary determination using a locally adaptive level set algorithm
This paper introduces a level set methodology for the precise boundary localization of image objects within an indicated region, designed to be particularly robust against weak or...
Eftychios Sifakis, George Tziritas
CHES
2007
Springer
165views Cryptology» more  CHES 2007»
14 years 2 months ago
FPGA Intrinsic PUFs and Their Use for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different approach to...
Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrij...
ICMLC
2005
Springer
14 years 1 months ago
Evolutionary Synthesis of Micromachines Using Supervisory Multiobjective Interactive Evolutionary Computation
A novel method of Interactive Evolutionary Computation (IEC) for the design of microelectromechanical systems (MEMS) is presented. As the main limitation of IEC is human fatigue, a...
Raffi R. Kamalian, Ying Zhang, Hideyuki Takagi, Al...
GLVLSI
1996
IEEE
125views VLSI» more  GLVLSI 1996»
14 years 3 days ago
Performance-Driven Interconnect Global Routing
In this paper, we propose a global routing algorithm for multi-layer building-block layouts. The algorithm is based on successive ripup and rerouting while satisfying edge capacit...
Dongsheng Wang, Ernest S. Kuh