Sciweavers

1192 search results - page 152 / 239
» Computing Weakest Readings
Sort
View
DSN
2007
IEEE
15 years 10 months ago
Reliability Techniques for RFID-Based Object Tracking Applications
Radio Frequency Identification (RFID) technology has the potential to dramatically improve numerous industrial practices. However, it still faces many challenges, including secur...
Ahmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittw...
111
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Two-Tier Multiple Query Optimization for Sensor Networks
When there are multiple queries posed to the resourceconstrained wireless sensor network, it is critical to process them efficiently. In this paper, we propose a Two-Tier Multipl...
Shili Xiang, Hock-Beng Lim, Kian-Lee Tan, Yongluan...
138
Voted
IPPS
2007
IEEE
15 years 10 months ago
Linking Compilation and Visualization for Massively Parallel Programs
This paper presents a technique to visualize the communication pattern of a parallel application at different points during its execution. Unlike many existing tools that show the...
Alex K. Jones, Raymond R. Hoare, Joseph St. Onge, ...
NOCS
2007
IEEE
15 years 10 months ago
QNoC Asynchronous Router with Dynamic Virtual Channel Allocation
An asynchronous router for QNoC (Quality-of service NoC) is presented. It combines multiple service levels (SL) with multiple equal-priority virtual channels (VC) within each leve...
Rostislav (Reuven) Dobkin, Ran Ginosar, Israel Cid...
120
Voted
SIBGRAPI
2007
IEEE
15 years 10 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer