Sciweavers

37 search results - page 7 / 8
» Probabilistic modeling of dependencies during switching acti...
Sort
View
ICCAD
2006
IEEE
101views Hardware» more  ICCAD 2006»
13 years 11 months ago
Thermal-induced leakage power optimization by redundant resource allocation
Traditionally, at early design stages, leakage power is associated with the number of transistors in a design. Hence, intuitively an implementation with minimum resource usage wou...
Min Ni, Seda Ogrenci Memik
MOBIHOC
2005
ACM
14 years 4 months ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
DCOSS
2006
Springer
13 years 9 months ago
Lifetime Maximization of Sensor Networks Under Connectivity and k-Coverage Constraints
In this paper, we study the fundamental limits of a wireless sensor network's lifetime under connectivity and k-coverage constraints. We consider a wireless sensor network wit...
Wei Mo, Daji Qiao, Zhengdao Wang
JSS
2010
120views more  JSS 2010»
13 years 3 months ago
An evaluation of timed scenario notations
There is a general consensus on the importance of good Requirements Engineering (RE) for achieving high quality software. The modeling and analysis of requirements have been the m...
Jameleddine Hassine, Juergen Rilling, Rachida Dsso...
ATAL
2007
Springer
13 years 11 months ago
Towards using multiple cues for robust object recognition
A robot’s ability to assist humans in a variety of tasks, e.g. in search and rescue or in a household, heavily depends on the robot’s reliable recognition of the objects in th...
Sarah Aboutalib, Manuela M. Veloso