Sciweavers

42 search results - page 7 / 9
» Using Lower Bounds During Dynamic BDD Minimization
Sort
View
ICIP
2006
IEEE
14 years 7 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
CIAC
1994
Springer
148views Algorithms» more  CIAC 1994»
13 years 10 months ago
Efficient Reorganization of Binary Search Trees
We consider the problem of maintaining a binary search tree (BST) that minimizes the average access cost needed to satisfy randomly generated requests. We analyze scenarios in whi...
Micha Hofri, Hadas Shachnai
TAPAS
2011
243views Algorithms» more  TAPAS 2011»
13 years 1 months ago
Speed Scaling for Energy and Performance with Instantaneous Parallelism
Abstract. We consider energy-performance tradeoff for scheduling parallel jobs on multiprocessors using dynamic speed scaling. The objective is to minimize the sum of energy consu...
Hongyang Sun, Yuxiong He, Wen-Jing Hsu
CN
2007
168views more  CN 2007»
13 years 6 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
TVLSI
2002
97views more  TVLSI 2002»
13 years 5 months ago
Techniques for energy-efficient communication pipeline design
The performance of many modern computer and communication systems is dictated by the latency of communication pipelines. At the same time, power/energy consumption is often another...
Gang Qu, Miodrag Potkonjak