Sciweavers

6229 search results - page 949 / 1246
» Models of Computation for Networks on Chip
Sort
View
108
Voted
PERCOM
2009
ACM
15 years 7 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
IWCMC
2009
ACM
15 years 7 months ago
A cognitive radio system for home theatre "5+1 audio" surround applications
This paper presents the application of cognitive algorithm for a stream diffusion in home theatre “5+1 audio” surround applications. We develop a wavelet-based method to effic...
Valeria Orani, Vlad Popescu, Maurizio Murroni
GLOBECOM
2008
IEEE
15 years 7 months ago
Guaranteed Boxed Localization in MANETs by Interval Analysis and Constraints Propagation Techniques
Abstract—In this contribution, we propose an original algorithm for self-localization in mobile ad-hoc networks. The proposed technique, based on interval analysis, is suited to ...
Farah Mourad, Hichem Snoussi, Fahed Abdallah, C&ea...
INFOCOM
2007
IEEE
15 years 7 months ago
On Optimal Physical Carrier Sensing: Theoretical Analysis and Protocol Design
— Traditional Physical Carrier Sensing (PCS), which aims at eliminating hidden terminals in wireless networks, causes too many exposed terminals and deteriorates the throughput p...
Yanfeng Zhu, Qian Zhang, Zhisheng Niu, Jing Zhu
86
Voted
CP
2007
Springer
15 years 6 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...