Sciweavers

1513 search results - page 289 / 303
» A self-describing data transfer model for ITS applications
Sort
View
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 6 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
99
Voted
ICC
2007
IEEE
15 years 6 months ago
Modulation Schemes Based on Orthogonal Pulses for Time Hopping Ultra Wideband Radio Systems
— This paper describes a combined modulation scheme for time hopping ultra wideband (TH-UWB) radio systems using on-off keying (OOK) and pulse shape modulation (PSM). For this sc...
Sudhan Majhi, A. S. Madhukumar, A. Benjamin Premku...
IJCNN
2007
IEEE
15 years 6 months ago
Parallel Learning of Large Fuzzy Cognitive Maps
— Fuzzy Cognitive Maps (FCMs) are a class of discrete-time Artificial Neural Networks that are used to model dynamic systems. A recently introduced supervised learning method, wh...
Wojciech Stach, Lukasz A. Kurgan, Witold Pedrycz
CODES
2006
IEEE
15 years 5 months ago
A formal approach to robustness maximization of complex heterogeneous embedded systems
Embedded system optimization typically considers objectives such as cost, timing, buffer sizes and power consumption. Robustness criteria, i.e. sensitivity of the system to variat...
Arne Hamann, Razvan Racu, Rolf Ernst
GLOBECOM
2006
IEEE
15 years 5 months ago
Honeycomb Architecture for Energy Conservation in Wireless Sensor Networks
— Reducing energy consumption has been a recent focus of wireless sensor network research. Topology control explores the potential that a dense network has for energy savings. On...
Ren Ping Liu, Glynn Rogers, Sihui Zhou