Sciweavers

9186 search results - page 1340 / 1838
» A Module System for Scheme
Sort
View
CAL
2006
15 years 4 months ago
User-Driven Frequency Scaling
Abstract-- We propose and evaluate User-Driven Frequency Scaling (UDFS) for improved power management on processors that support Dynamic Voltage and Frequency Scaling (DVFS), e.g, ...
Arindam Mallik, Bin Lin, Gokhan Memik, Peter A. Di...
CORR
2006
Springer
126views Education» more  CORR 2006»
15 years 4 months ago
The Gaussian Multiple Access Wire-Tap Channel
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intellige...
Ender Tekin, Aylin Yener
IJSN
2008
80views more  IJSN 2008»
15 years 4 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
JSAC
2008
86views more  JSAC 2008»
15 years 4 months ago
Distributed function calculation and consensus using linear iterative strategies
Given an arbitrary network of interconnected nodes, we develop and analyze a distributed strategy that enables a subset of the nodes to calculate any given function of the node val...
Shreyas Sundaram, Christoforos N. Hadjicostis
JMM2
2006
133views more  JMM2 2006»
15 years 4 months ago
An Adaptive Method for Image Recovery in the DFT Domain
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Peining Tao, Ahmet M. Eskicioglu
« Prev « First page 1340 / 1838 Last » Next »