Sciweavers

9405 search results - page 1748 / 1881
» Computing a Model of Set Theory
Sort
View
153
Voted
VLSID
2003
IEEE
134views VLSI» more  VLSID 2003»
16 years 4 months ago
A Framework for Energy and Transient Power Reduction during Behavioral Synthesis
Abstract-- In battery driven portable applications, the minimization of energy, average power, peak power, and peak power differential are equally important to improve reliability ...
Saraju P. Mohanty, N. Ranganathan
VLSID
2002
IEEE
177views VLSI» more  VLSID 2002»
16 years 4 months ago
RTL-Datapath Verification using Integer Linear Programming
Satisfiability of complex word-level formulas often arises as a problem in formal verification of hardware designs described at the register transfer level (RTL). Even though most...
Raik Brinkmann, Rolf Drechsler
ICSE
2005
IEEE-ACM
16 years 4 months ago
A cross-program investigation of students' perceptions of agile methods
Research was conducted on using agile methods in software engineering education. This paper explores the perceptions of students from five different academic levels of agile pract...
Grigori Melnik, Frank Maurer
124
Voted
PERCOM
2007
ACM
16 years 3 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
118
Voted
EWSN
2004
Springer
16 years 3 months ago
Lessons from a Sensor Network Expedition
Habitat monitoring is an important driving application for wireless sensor networks (WSNs). Although researchers anticipate some challenges arising in the real-world deployments of...
Robert Szewczyk, Joseph Polastre, Alan M. Mainwari...
« Prev « First page 1748 / 1881 Last » Next »