Sciweavers

15254 search results - page 2944 / 3051
» A k
Sort
View
JRTIP
2008
118views more  JRTIP 2008»
14 years 9 months ago
Custom parallel caching schemes for hardware-accelerated image compression
Abstract In an effort to achieve lower bandwidth requirements, video compression algorithms have become increasingly complex. Consequently, the deployment of these algorithms on Fi...
Su-Shin Ang, George A. Constantinides, Wayne Luk, ...
JSAC
2008
140views more  JSAC 2008»
14 years 9 months ago
Optimality and Complexity of Pure Nash Equilibria in the Coverage Game
In this paper, we investigate the coverage problem in wireless sensor networks using a game theory method. We assume that nodes are randomly scattered in a sensor field and the goa...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
JSAC
2008
94views more  JSAC 2008»
14 years 9 months ago
An overview of limited feedback in wireless communication systems
Abstract--It is now well known that employing channel adaptive signaling in wireless communication systems can yield large improvements in almost any performance metric. Unfortunat...
David James Love, Robert W. Heath Jr., Vincent K. ...
JSS
2008
86views more  JSS 2008»
14 years 9 months ago
Understanding knowledge sharing activities in free/open source software projects: An empirical study
Free/Open Source Software (F/OSS) projects are people-oriented and knowledge intensive software development environments. Many researchers focused on mailing lists to study coding...
Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angel...
DKE
2007
130views more  DKE 2007»
14 years 9 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
« Prev « First page 2944 / 3051 Last » Next »