Sciweavers

5153 search results - page 995 / 1031
» Introduction to Randomized Algorithms
Sort
View
DATE
2007
IEEE
107views Hardware» more  DATE 2007»
15 years 4 months ago
Routing table minimization for irregular mesh NoCs
The majority of current Network on Chip (NoC) architectures employ mesh topology and use simple static routing, to reduce power and area. However, regular mesh topology is unreali...
Evgeny Bolotin, Israel Cidon, Ran Ginosar, Avinoam...
FOCS
2007
IEEE
15 years 4 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
88
Voted
ICC
2007
IEEE
185views Communications» more  ICC 2007»
15 years 4 months ago
Maximal Lifetime Rate and Power Allocation for Sensor Networks with Data Distortion Constraints
— We address a lifetime maximization problem for a single-hop wireless sensor network where multiple sensors encode and communicate their measurements of a Gaussian random source...
James C. F. Li, Subhrakanti Dey, Jamie S. Evans
IROS
2007
IEEE
189views Robotics» more  IROS 2007»
15 years 4 months ago
Person following with a mobile robot using binocular feature-based tracking
Abstract— We present the Binocular Sparse Feature Segmentation (BSFS) algorithm for vision-based person following with a mobile robot. BSFS uses Lucas-Kanade feature detection an...
Zhichao Chen, Stanley T. Birchfield
SIPS
2007
IEEE
15 years 4 months ago
Systematic Luby Transform Codes and Their Soft Decoding
– Luby Transform codes (LT) were originally designed for the Binary Erasure Channel (BEC) encountered owing to randomly dropped packets in the statistical multiplexing aided clas...
Thanh Dang Nguyen, Lie-Liang Yang, Lajos Hanzo