Sciweavers

1986 search results - page 144 / 398
» constraints 2006
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
ISQED
2006
IEEE
78views Hardware» more  ISQED 2006»
14 years 1 months ago
Simultaneous Statistical Delay and Slew Optimization for Interconnect Pipelines
Process variation has become a major concern in the design of many nanometer circuits, including interconnect pipelines. This paper develops closed-form models to predict the dela...
Andrew Havlir, David Z. Pan
ICCAD
2006
IEEE
124views Hardware» more  ICCAD 2006»
14 years 4 months ago
Robust system level design with analog platforms
An approach to robust system level mixed signal design is presented based on analog platforms. The bottom-up characterization phase of platform components provides accurate perfor...
Fernando De Bernardinis, Pierluigi Nuzzo, Alberto ...
CIVR
2006
Springer
114views Image Analysis» more  CIVR 2006»
13 years 11 months ago
Keyframe Retrieval by Keypoints: Can Point-to-Point Matching Help?
Abstract. Bag-of-words representation with visual keypoints has recently emerged as an attractive approach for video search. In this paper, we study the degree of improvement when ...
Wanlei Zhao, Yu-Gang Jiang, Chong-Wah Ngo
CVPR
2006
IEEE
14 years 10 months ago
Shape from Shading: Recognizing the Mountains through a Global View
Resolving local ambiguities is an important issue for shape from shading (SFS). Pixel ambiguities of SFS can be eliminated by propagation approaches. However, patch ambiguities st...
Qihui Zhu, Jianbo Shi