Sciweavers

828 search results - page 131 / 166
» Bounded Hairpin Completion
Sort
View
125
Voted
IJAHUC
2007
111views more  IJAHUC 2007»
15 years 13 days ago
Configuring node status in a two-phase tightly integrated mode for wireless sensor networks
: In wireless sensor networks, one of the main design challenges is to save severely constrained energy resources and obtain a long system lifetime. Low cost of sensors enables us ...
Di Tian, Zhijun Lei, Nicolas D. Georganas
114
Voted
IVC
2007
102views more  IVC 2007»
15 years 13 days ago
Analysis of the rubberband algorithm
We consider simple cube-curves in the orthogonal 3D grid of cells. The union of all cells contained in such a curve (also called the tube of this curve) is a polyhedrally bounded s...
Fajie Li, Reinhard Klette
93
Voted
TOG
2008
114views more  TOG 2008»
15 years 13 days ago
Single image tree modeling
In this paper, we introduce a simple sketching method to generate a realistic 3D tree model from a single image. The user draws at least two strokes in the tree image: the first c...
Ping Tan, Tian Fang, Jianxiong Xiao, Peng Zhao, Lo...
TPDS
2008
169views more  TPDS 2008»
15 years 12 days ago
Dynamic Resource Management in Energy Constrained Heterogeneous Computing Systems Using Voltage Scaling
An ad hoc grid is a wireless heterogeneous computing environment without a fixed infrastructure. This study considers wireless devices that have different capabilities, have limite...
Jong-Kook Kim, Howard Jay Siegel, Anthony A. Macie...
109
Voted
JNCA
2007
75views more  JNCA 2007»
15 years 12 days ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du