Sciweavers

111 search results - page 6 / 23
» Effective Iterative Techniques for Fingerprinting Design IP
Sort
View
DAC
2006
ACM
15 years 3 months ago
Design in reliability for communication designs
Silicon design implementation has become increasingly complex with the deep submicron technologies such as 90nm and below. It is common to see multiple processor cores, several ty...
Uday Reddy Bandi, Murty Dasaka, Pavan K. Kumar
INFOCOM
2007
IEEE
15 years 3 months ago
Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN
Abstract—An emerging killer application for enterprise wireless LANs (WLANs) is voice over IP (VoIP) telephony, which promises to greatly improve the reachability and mobility of...
Fanglu Guo, Tzi-cker Chiueh
EDBT
2006
ACM
172views Database» more  EDBT 2006»
15 years 9 months ago
Fast Query Point Movement Techniques with Relevance Feedback for Content-Based Image Retrieval
Abstract. Target search in content-based image retrieval (CBIR) systems refers to finding a specific (target) image such as a particular registered logo or a specific historical ph...
Danzhou Liu, Kien A. Hua, Khanh Vu, Ning Yu
ICIP
2002
IEEE
15 years 2 months ago
An iterative algorithm for context selection in adaptive entropy coders
Context-based adaptive entropy coding is an essential feature of modern image compression algorithms; however, the design of these coders is non-trivial due to the balance that mu...
Tong Jin, Jacques Vaisey
CHI
2010
ACM
14 years 8 months ago
Social tagging revamped: supporting the users' need of self-promotion through persuasive techniques
People share pictures online to increase their social presence. However, recent studies have shown that most of the content shared in social networks is not looked at by peers. Pr...
Mauro Cherubini, Alejandro Gutierrez, Rodrigo de O...