Sciweavers

4325 search results - page 698 / 865
» Incremental computation with names
Sort
View
DFT
2003
IEEE
99views VLSI» more  DFT 2003»
15 years 4 months ago
Dependability Analysis of CAN Networks: An Emulation-Based Approach
1 Today many safety-critical applications are based on distributed systems where several computing nodes exchange information via suitable network interconnections. An example of t...
J. Pérez, Matteo Sonza Reorda, Massimo Viol...
EH
2003
IEEE
247views Hardware» more  EH 2003»
15 years 4 months ago
Evolvable Building Blocks for Analog Fuzzy Logic Controllers
This work discusses the use of an Evolvable Hardware (EHW) platform in the synthesis of analog electronic circuits for Fuzzy Logic Controllers. A Fuzzy Logic Controller (FLC) is d...
Jorge Luís Machado do Amaral, José F...
ISCAS
2003
IEEE
235views Hardware» more  ISCAS 2003»
15 years 4 months ago
Enhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of...
Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. I...
ISCC
2003
IEEE
15 years 4 months ago
A Framework for Wireless Ad hoc Networks with a Quasi-Guaranteed Minimum System Lifetime
In previous work, we thoroughly studied the intricate problem of energy conservation in wireless ad hoc networks. Consequently, we proposed a novel framework, namely Quasi-Guarante...
Ahmed M. Safwat, Hossam S. Hassanein, Hussein T. M...
PERCOM
2003
ACM
15 years 4 months ago
Object Labelling from Human Action Recognition
This paper presents a method for finding and classifying objects within real-world scenes by using the activity of humans interacting with these objects to infer the object’s i...
Patrick Peursum, Svetha Venkatesh, Geoff A. W. Wes...