Sciweavers

1654 search results - page 233 / 331
» Comparing Two Software Design Process Theories
Sort
View
ICAD
2004
15 years 6 months ago
Capture and Recreation of Higher-Order 3D Sound Fields via Reciprocity
We propose a unified and simple approach for capturing and recreating 3D sound fields by exploring the reciprocity principle that is satisfied between the two processes. Our appro...
Zhiyun Li, Ramani Duraiswami, Nail A. Gumerov
LCTRTS
2004
Springer
15 years 10 months ago
Spinach: a liberty-based simulator for programmable network interface architectures
This paper presents Spinach, a new simulator toolset specifically designed to target programmable network interface architectures. Spinach models both system components that are ...
Paul Willmann, Michael Brogioli, Vijay S. Pai
COMCOM
2010
131views more  COMCOM 2010»
15 years 3 months ago
Level the buffer wall: Fair channel assignment in wireless sensor networks
—In this paper, we study the trade-off between network throughput and fairness in a multi-channel enabled WSN. Traditional approaches attempt to solve the two problems in an isol...
Yanyan Yang, Yunhuai Liu, Lionel M. Ni
CIVR
2008
Springer
125views Image Analysis» more  CIVR 2008»
15 years 6 months ago
Leveraging user query log: toward improving image data clustering
Image clustering is useful in many retrieval and classification applications. The main goal of image clustering is to partition a given dataset into salient clusters such that the...
Hao Cheng, Kien A. Hua, Khanh Vu
CCS
2010
ACM
15 years 5 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...