Sciweavers

3318 search results - page 181 / 664
» The Weak Instance Model
Sort
View
ICCAD
2006
IEEE
100views Hardware» more  ICCAD 2006»
14 years 5 months ago
Faster, parametric trajectory-based macromodels via localized linear reductions
— Trajectory-based methods offer an attractive methodology for automated, on-demand generation of macromodels for custom circuits. These models are generated by sampling the stat...
Saurabh K. Tiwary, Rob A. Rutenbar
ICASSP
2009
IEEE
14 years 3 months ago
Incremental predictive and adaptive noise compensation
Model compensation schemes are a powerful approach to handling mismatches between training and testing conditions. Normally these schemes are run in a batch adaptation mode, re-re...
Federico Flego, Mark J. F. Gales
BIBE
2008
IEEE
109views Bioinformatics» more  BIBE 2008»
14 years 2 months ago
Retrieval and ranking of biomedical images using boosted haar features
— Retrieving similar images from large repository of heterogeneous biomedical images has been a difficult research task. In this paper, we develop a retrieval system that uses H...
Chandan K. Reddy, Fahima A. Bhuyan
TARK
2007
Springer
14 years 2 months ago
Unawareness, beliefs and games
We define a generalized state-space model with interactive unawareness and probabilistic beliefs. Such models are desirable for many potential applications of asymmetric unawaren...
Aviad Heifetz, Martin Meier, Burkhard C. Schipper
ASWEC
2006
IEEE
14 years 2 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge