Conference paper
Modeling polarization for Hyper-NA lithography tools and masks
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
Knowledge-based techniques have much to offer security practitioners. After brief overviews of these techniques, we review applications described in the literature and suggest others. Applications in other domains that offer insights for security are also described. Requirements for knowledge system tools are discussed in the light of the suggested applications. © 1988.
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
Maurice Hanan, Peter K. Wolff, et al.
DAC 1976
John M. Boyer, Charles F. Wiecha
DocEng 2009
M.F. Cowlishaw
IBM Systems Journal