Sciweavers

24529 search results - page 4759 / 4906
» Computing on Authenticated Data
Sort
View
ICASSP
2009
IEEE
15 years 10 months ago
Compressive confocal microscopy
In this paper, a new approach for Confocal Microscopy (CM) based on the framework of compressive sensing is developed. In the proposed approach, a point illumination and a random ...
Peng Ye, José L. Paredes, Gonzalo R. Arce, ...
154
Voted
WCRE
2009
IEEE
15 years 10 months ago
A Study of the Time Dependence of Code Changes
—Much of modern software development consists of building on older changes. Older periods provide the structure (e.g., functions and data types) on which changes in future period...
Omar Alam, Bram Adams, Ahmed E. Hassan
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 10 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
ICNP
2009
IEEE
15 years 10 months ago
ESC: Energy Synchronized Communication in Sustainable Sensor Networks
—With advances in energy harvesting techniques, it is now feasible to build sustainable sensor networks (SSN) to support long-term applications. Unlike battery-powered sensor net...
Yu Gu, Ting Zhu, Tian He
107
Voted
IEEEPACT
2009
IEEE
15 years 10 months ago
Quantifying the Potential of Program Analysis Peripherals
Abstract—As programmers are asked to manage more complicated parallel machines, it is likely that they will become increasingly dependent on tools such as multi-threaded data rac...
Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood
« Prev « First page 4759 / 4906 Last » Next »