Sciweavers

226 search results - page 37 / 46
» The Wide Trail Design Strategy
Sort
View
CCS
2009
ACM
14 years 3 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
ICRA
2008
IEEE
182views Robotics» more  ICRA 2008»
14 years 3 months ago
A body joint improves vertical to horizontal transitions of a wall-climbing robot
— Several recently-designed robots are able to scale steep surfaces using animal-inspired strategies for foot attachment and leg kinematics. These designs could be valuable for r...
Kathryn A. Daltorio, Timothy C. Witushynsky, Grego...
ASPDAC
2007
ACM
123views Hardware» more  ASPDAC 2007»
14 years 23 days ago
Coupling-aware Dummy Metal Insertion for Lithography
As integrated circuits manufacturing technology is advancing into 65nm and 45nm nodes, extensive resolution enhancement techniques (RETs) are needed to correctly manufacture a chip...
Liang Deng, Martin D. F. Wong, Kai-Yuan Chao, Hua ...
EOR
2006
135views more  EOR 2006»
13 years 8 months ago
Principles of scatter search
Scatter search is an evolutionary method that has been successfully applied to hard optimization problems. The fundamental concepts and principles of the method were first propose...
Rafael Martí, Manuel Laguna, Fred Glover
INFSOF
2007
145views more  INFSOF 2007»
13 years 8 months ago
Metrics for data warehouse conceptual models understandability
Due to the principal role of Data warehouses (DW) in making strategy decisions, data warehouse quality is crucial for organizations. Therefore, we should use methods, models, tech...
Manuel A. Serrano, Juan Trujillo, Coral Calero, Ma...