Sciweavers

369 search results - page 56 / 74
» Adaptive control solution for T1DM control
Sort
View
OTM
2007
Springer
15 years 4 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
AINA
2005
IEEE
15 years 3 months ago
IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives
The wireless mesh network has been an emerging technology in recent years. Because the transmission medium used in networking backhaul APs is radio, the wireless mesh network is n...
Tzu-Jane Tsai, Ju-Wei Chen
GRID
2005
Springer
15 years 3 months ago
Protecting grid data transfer services with active network interfaces
A key goal of grid computing is to provide seamless access to shared computational and data resources across organizational boundaries, in distributed virtual organizations. Grid ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
ICCS
2004
Springer
15 years 3 months ago
Bayer Pattern Demosaicking Using Local-Correlation Approach
A new Bayer pattern demosaicking scheme for single-sensor digital cameras is introduced. The raw output from a sensor, mostly a charge coupled device (CCD) or a complementary metal...
Rastislav Lukac, Konstantinos N. Plataniotis, Anas...
ICCAD
2003
IEEE
140views Hardware» more  ICCAD 2003»
15 years 3 months ago
Circuit Simulation of Nanotechnology Devices with Non-monotonic I-V Characteristics
As research begins to explore potential nanotechnologies for future post-CMOS integrated systems, modeling and simulation environments must be developed that can accommodate the c...
Jiayong Le, Lawrence T. Pileggi, Anirudh Devgan