Sciweavers

13841 search results - page 2581 / 2769
» Algorithms and Constraint Programming
Sort
View
131
Voted
RTCSA
2005
IEEE
15 years 9 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
147
Voted
TRIDENTCOM
2005
IEEE
15 years 9 months ago
A Geography-Aware Scalable Community Wireless Network Test Bed
Wireless mesh networks have increasingly become an object of interest in recent years as a strong alternative to purely wired infrastructure networks and purely mobile wireless ne...
Bow-Nan Cheng, Shivkumar Kalyanaraman, Max Klein
MM
2005
ACM
152views Multimedia» more  MM 2005»
15 years 9 months ago
A repeated video clip identification system
Identifying short repeated video clips, such as news program logo, station logo, TV commercials, etc., from broadcasting video databases or streams is important for video content ...
Xianfeng Yang, Ping Xue, Qi Tian
SIGCSE
2005
ACM
125views Education» more  SIGCSE 2005»
15 years 9 months ago
Efficient use of robots in the undergraduate curriculum
In this paper we describe how a single Khepera II robot was used for an assignment in a senior level course on graphical user interface implementation. The assignment required eac...
Judith Challinger
158
Voted
WIDM
2005
ACM
15 years 9 months ago
Query translation scheme for heterogeneous XML data sources
In order to formulate a meaningful XML query, a user must have some knowledge of the schema of the XML documents to be queried. The query will succeed only if the schema of the ac...
Cindy X. Chen, George A. Mihaila, Sriram Padmanabh...
« Prev « First page 2581 / 2769 Last » Next »