Sciweavers

2367 search results - page 83 / 474
» An experimental analysis of self-adjusting computation
Sort
View
ISBI
2008
IEEE
15 years 6 months ago
Theoretical analysis of complex-conjugate-ambiguity suppression in frequency-domain optical-coherence tomography
New phase-shifting techniques have recently been proposed to suppress the complex-conjugate ambiguity in frequencydomain optical-coherence tomography. A phase shift is introduced,...
S. Chandra Sekhar, Roland Michaely, Rainer A. Leit...
DCOSS
2005
Springer
15 years 5 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
ICIC
2005
Springer
15 years 5 months ago
Analysis of SCTP Handover by Movement Patterns
Stream Control Transmission Protocol (SCTP) is a new end-to-end transport protocol, which can be used to support the mobility of mobile terminals. This paper describes a framework ...
Dong Phil Kim, Seok Joo Koh, Sang Wook Kim
ISLPED
2007
ACM
132views Hardware» more  ISLPED 2007»
15 years 1 months ago
Thermal response to DVFS: analysis with an Intel Pentium M
Increasing power density in computing systems from laptops to servers has spurred interest in dynamic thermal management. Based on the success of dynamic voltage and frequency sca...
Heather Hanson, Stephen W. Keckler, Soraya Ghiasi,...
ICIP
2008
IEEE
16 years 1 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...