Sciweavers

6409 search results - page 1108 / 1282
» A Computational Algorithm for Origami Design
Sort
View
132
Voted
SASN
2006
ACM
15 years 7 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
134
Voted
SENSYS
2006
ACM
15 years 7 months ago
Lazy cross-link removal for geographic routing
Geographic techniques promise highly scalable any-toany routing in wireless sensor networks. In one thread of research on geographic routing, researchers have explored robust, dis...
Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott S...
UIST
2006
ACM
15 years 7 months ago
Comparing and managing multiple versions of slide presentations
Despite the ubiquity of slide presentations, managing multiple presentations remains a challenge. Understanding how multiple versions of a presentation are related to one another,...
Steven M. Drucker, Georg Petschnigg, Maneesh Agraw...
125
Voted
CODES
2005
IEEE
15 years 7 months ago
Satisfying real-time constraints with custom instructions
Instruction-set extensible processors allow an existing processor core to be extended with application-specific custom instructions. In this paper, we explore a novel application...
Pan Yu, Tulika Mitra
DATE
2005
IEEE
158views Hardware» more  DATE 2005»
15 years 7 months ago
Scheduling of Soft Real-Time Systems for Context-Aware Applications
Context-aware applications pose new challenges, including a need for new computational models, uncertainty management, and efficient optimization under uncertainty. Uncertainty c...
Jennifer L. Wong, Weiping Liao, Fei Li, Lei He, Mi...
« Prev « First page 1108 / 1282 Last » Next »