Sciweavers

81 search results - page 13 / 17
» Deployment of Better Than Worst-Case Design: Solutions and N...
Sort
View
95
Voted
CGF
2010
153views more  CGF 2010»
14 years 9 months ago
Localized Delaunay Refinement for Sampling and Meshing
The technique of Delaunay refinement has been recognized as a versatile tool to generate Delaunay meshes of a variety of geometries. Despite its usefulness, it suffers from one la...
Tamal K. Dey, Joshua A. Levine, A. Slatton
SENSYS
2004
ACM
15 years 3 months ago
Versatile low power media access for wireless sensor networks
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...
Joseph Polastre, Jason L. Hill, David E. Culler
ASPDAC
2005
ACM
65views Hardware» more  ASPDAC 2005»
15 years 3 months ago
Multilevel full-chip gridless routing considering optical proximity correction
To handle modern routing with nanometer effects, we need to consider designs of variable wire widths and spacings, for which gridless routers are desirable due to their great fle...
Tai-Chen Chen, Yao-Wen Chang
94
Voted
TMM
2010
152views Management» more  TMM 2010»
14 years 4 months ago
Network Awareness of P2P Live Streaming Applications: A Measurement Study
Abstract--Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about h...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig