Sciweavers

1427 search results - page 232 / 286
» Achieving High Performance with FPGA-Based Computing
Sort
View
ASPDAC
2005
ACM
133views Hardware» more  ASPDAC 2005»
14 years 11 months ago
A novel O(n) parallel banker's algorithm for System-on-a-Chip
This paper proposes a novel O(n) Parallel Banker’s Algorithm (PBA) with a best-case run-time of O(1), reduced from an ¢¤£¦¥¨§© run-time complexity of the original Ban...
Jaehwan John Lee, Vincent John Mooney III
HCI
2007
14 years 11 months ago
A System for Adaptive Multimodal Interaction in Crisis Environments
In the recent years multimodal interfaces have acquired an important role in human computer interaction applications. Subsequently these interfaces become more and more human-orien...
Dragos Datcu, Zhenke Yang, Léon J. M. Rothk...
ICASSP
2010
IEEE
14 years 10 months ago
Utilizing principal singular vectors for two-dimensional single frequency estimation
In this paper, frequency estimation of a twodimensional (2D) cisoid in the presence of additive white Gaussian noise is addressed. By utilizing the rank-one property of the 2D noi...
H. C. So, Frankie K. W. Chan, C. F. Chan, W. H. La...
ADHOC
2008
132views more  ADHOC 2008»
14 years 10 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
JSAC
2006
127views more  JSAC 2006»
14 years 9 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang