Sciweavers

850 search results - page 123 / 170
» An Architecture for Adaptive Algorithmic Hybrids
Sort
View
80
Voted
ISCAS
2007
IEEE
132views Hardware» more  ISCAS 2007»
15 years 6 months ago
On-Line Histogram Equalization for Flash ADC
— We present theory, design and measurement results for an on-line histogram equalization algorithm implemented on a 750MS/s 6b flash analog to digital converter in standard 0.3...
Yanyi Liu Wong, Marc H. Cohen, Pamela Abshire
MSWIM
2005
ACM
15 years 6 months ago
A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks
In the last few years, the advance of multimedia applications has prompted researchers to undertake the task of routing multimedia data through Manet. This task is rather difficul...
Saida Ziane, Abdelhamid Mellouk
140
Voted
PEWASUN
2004
ACM
15 years 6 months ago
A simulation study on multi-rate mobile ad hoc networks
This paper studies the performance of a multi-rate mobile ad hoc network (MANET) using an extended ns-2 simulator. A link adaptation algorithm is developed and tested. The multi-r...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava
ICISC
2004
169views Cryptology» more  ICISC 2004»
15 years 1 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
187
Voted
CP
2009
Springer
16 years 1 months ago
Confidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing ...
Geoffrey Chu, Christian Schulte, Peter J. Stuckey