Sciweavers

7943 search results - page 169 / 1589
» A calculus for costed computations
Sort
View
PERCOM
2008
ACM
15 years 10 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
82
Voted
ICCAD
2008
IEEE
115views Hardware» more  ICCAD 2008»
15 years 8 months ago
Minimizing the energy cost of throughput in a linear pipeline by opportunistic time borrowing
- In this paper, we present a technique to optimize the energy-delay product of a synchronous linear pipeline circuit with dynamic error detection and correction capability running...
Mohammad Ghasemazar, Massoud Pedram
90
Voted
AVSS
2009
IEEE
15 years 5 months ago
Cost-Effective Solution to Synchronized Audio-Visual Capture Using Multiple Sensors
Abstract—Applications such as surveillance and human motion capture require high-bandwidth recording from multiple cameras. Furthermore, the recent increase in research on sensor...
Jeroen Lichtenauer, Michel François Valstar...
LION
2009
Springer
145views Optimization» more  LION 2009»
15 years 5 months ago
A Variable Neighborhood Descent Search Algorithm for Delay-Constrained Least-Cost Multicast Routing
Abstract. The rapid evolution of real-time multimedia applications requires Quality of Service (QoS) based multicast routing in underlying computer networks. The constrained Steine...
Rong Qu, Ying Xu, Graham Kendall
LICS
2007
IEEE
15 years 5 months ago
The Cost of Punctuality
In an influential paper titled “The Benefits of Relaxing Punctuality” [2], Alur, Feder, and Henzinger introduced Metric Interval Temporal Logic (MITL) as a fragment of the r...
Patricia Bouyer, Nicolas Markey, Joël Ouaknin...