Sciweavers

4650 search results - page 830 / 930
» Generating and evaluating evaluative arguments
Sort
View
MOBIHOC
2003
ACM
16 years 1 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
MICCAI
2009
Springer
15 years 11 months ago
A Spatio-temporal Atlas of the Human Fetal Brain with Application to Tissue Segmentation
Modeling and analysis of MR images of the early developing human brain is a challenge because of the transient nature of different tissue classes during brain growth. To address th...
Piotr A. Habas, Kio Kim, François Rousseau,...
EUROSYS
2007
ACM
15 years 10 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...
EWSN
2010
Springer
15 years 10 months ago
Selective Reprogramming of Mobile Sensor Networks through Social Community Detection
Abstract. We target application domains where the behavior of animals or humans is monitored using wireless sensor network (WSN) devices. The code on these devices is updated frequ...
Bence Pásztor, Luca Mottola, Cecilia Mascol...
ICCAD
2002
IEEE
94views Hardware» more  ICCAD 2002»
15 years 10 months ago
High-level synthesis of distributed logic-memory architectures
Abstract— With the increasing cost of global communication onchip, high-performance designs for data-intensive applications require architectures that distribute hardware resourc...
Chao Huang, Srivaths Ravi, Anand Raghunathan, Nira...