Sciweavers

10044 search results - page 1922 / 2009
» Authentication in Wireless Networks
Sort
View
VLDB
2005
ACM
177views Database» more  VLDB 2005»
16 years 4 months ago
Indexing mobile objects using dual transformations
With the recent advances in wireless networks, embedded systems and GPS technology, databases that manage the location of moving objects have received increased interest. In this ...
George Kollios, Dimitris Papadopoulos, Dimitrios G...
ICIAP
2005
ACM
16 years 4 months ago
Interactive, Mobile, Distributed Pattern Recognition
As the accuracy of conventional classifiers, based only on a static partitioning of feature space, appears to be approaching a limit, it may be useful to consider alternative appro...
George Nagy
ICCAD
2006
IEEE
129views Hardware» more  ICCAD 2006»
16 years 1 months ago
Energy budgeting for battery-powered sensors with a known task schedule
Battery-powered wireless sensors are severely constrained by the amount of the available energy. A method for computing the energy budget per sensing task can be a valuable design...
Daler N. Rakhmatov
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
16 years 1 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
CHI
2010
ACM
15 years 11 months ago
Evaluation of progressive image loading schemes
Although network bandwidth has increased dramatically, high-resolution images often take several seconds to load, and considerably longer on mobile devices over wireless connectio...
Chris Harrison, Anind K. Dey, Scott E. Hudson
« Prev « First page 1922 / 2009 Last » Next »