Sciweavers

5672 search results - page 1122 / 1135
» Design techniques for low-power systems
Sort
View
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
15 years 7 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun
ATAL
2003
Springer
15 years 7 months ago
Cooperative negotiation for soft real-time distributed resource allocation
In this paper we present a cooperative negotiation protocol that solves a distributed resource allocation problem while conforming to soft real-time constraints in a dynamic envir...
Roger Mailler, Victor R. Lesser, Bryan Horling
133
Voted
CCS
2003
ACM
15 years 7 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
155
Voted
DAGM
2003
Springer
15 years 7 months ago
A Computational Model of Early Auditory-Visual Integration
We introduce a computational model of sensor fusion based on the topographic representations of a ”two-microphone and one camera” configuration. Our aim is to perform a robust...
Carsten Schauer, Horst-Michael Gross
HUC
2003
Springer
15 years 7 months ago
Very Low-Cost Sensing and Communication Using Bidirectional LEDs
A novel microprocessor interface circuit is described which can alternately emit and detect light using only an LED, two digital I/O pins and a single current limiting resistor. T...
Paul H. Dietz, William S. Yerazunis, Darren Leigh
« Prev « First page 1122 / 1135 Last » Next »