Sciweavers

2421 search results - page 100 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
TMC
2012
13 years 3 months ago
Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks
—This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of Internet access gateways that allow a choice of alternative r...
Wanqing Tu, Cormac J. Sreenan, Chun Tung Chou, Arc...
88
Voted
VLSID
2005
IEEE
149views VLSI» more  VLSID 2005»
16 years 1 months ago
ADOPT: An Approach to Activity Based Delay Optimization
: The direct result of shrinking devices is not only higher densities but also increased switching activity and thus higher device temperatures. The variation in temperature over t...
Gaurav Arora, Abhishek Sharma, D. Nagchoudhuri, M....
120
Voted
IUI
2009
ACM
15 years 9 months ago
End-user programming of mashups with vegemite
Mashups are an increasingly popular way to integrate data from multiple web sites to fit a particular need, but it often requires substantial technical expertise to create them. T...
James Lin, Jeffrey Wong, Jeffrey Nichols, Allen Cy...
109
Voted
ICCS
2007
Springer
15 years 6 months ago
Complexity of Monte Carlo Algorithms for a Class of Integral Equations
In this work we study the computational complexity of a class of grid Monte Carlo algorithms for integral equations. The idea of the algorithms consists in an approximation of the ...
Ivan Dimov, Rayna Georgieva
76
Voted
IJDAR
2000
60views more  IJDAR 2000»
15 years 15 days ago
Integrated text and line-art extraction from a topographic map
Our proposed approach to text and line-art extraction requires accurately locating a text-string box and identifying external line vectors incident on the box. The results of extra...
Luyang Li, George Nagy, Ashok Samal, Sharad C. Set...