Mask data preparation

Known as: MDP, Mask fracturing, Mask generation 
Mask data preparation (MDP) is the procedure of translating a file containing the intended set of polygons from an integrated circuit layout into set… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Despite the recent success of deep learning for many speech processing tasks, single-microphone, speaker-independent speech… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Boneh and Franklin gave a naive revocation method in identity-based encryption (IBE) which imposes a huge overhead into the key… (More)
  • table I
  • figure 1
  • table III
Is this relevant?
2011
2011
Complex mask shapes will be required on critical layer masks for 20nm logic node, threatening to explode the mask write times… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
Presented is a microphone-array based approach for the extraction of individual signals from a mixture of competing sources and… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Connected filters are edge-preserving morphological operators, which rely on a notion of connectivity. This is usually the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2005
2005
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
“Grid” technology enables complex interactions among computational and data resources; however, to be deployed in production… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present a hand and face segmentation methodology using color and motion cues for the content-based representation of sign… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2004
2004
Schemes for encrypted key exchange are designed to provide two entities communicating over a public network, and sharing a (short… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Schemes for encrypted key exchange are designed to provide two entities communicating over a public network, and sharing a (short… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?