Sciweavers

JISE
2008
43views more  JISE 2008»
13 years 11 months ago
A Two-level Simultaneous Test Data and Time Reduction Technique for SOC
Yu-Te Liaw, Bing-Chuan Bai, James Chien-Mo Li
JISE
2008
59views more  JISE 2008»
13 years 11 months ago
Topological Analysis of Multi-phase Attacks using Expert Systems
Hamid Reza Shahriari, Yasser Ganjisaffar, Rasool J...
JISE
2008
77views more  JISE 2008»
13 years 11 months ago
A New Seed-Set Finding Approach for Iso-Surface Extraction
Chuan-Kai Yang, Chiang-Han Hung
JISE
2008
64views more  JISE 2008»
13 years 11 months ago
Analysis of All-or-Nothing Hash Functions
Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu
JISE
2008
77views more  JISE 2008»
13 years 11 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
JISE
2008
41views more  JISE 2008»
13 years 11 months ago
The Stretched Network: Properties, Routing, and Performance
Pooya Shareghi, Hamid Sarbazi-Azad