Sciweavers

22193 search results - page 3996 / 4439
» Multiple Restricted Multiplication
Sort
View
149
Voted
ISCAS
2005
IEEE
171views Hardware» more  ISCAS 2005»
15 years 10 months ago
Image transmission over IEEE 802.15.4 and ZigBee networks
An image sensor network platform is developed for testing transmission of images over ZigBee networks that support multi-hopping. The ZigBee is a low rate and low power networking...
G. Pekhteryev, Zafer Sahinoglu, Philip V. Orlik, G...
ISCC
2005
IEEE
112views Communications» more  ISCC 2005»
15 years 10 months ago
Distributed Direction-Based Localization in Wireless Sensor Networks
Location awareness is an attractive research issue in the wireless sensor network (WSN). However, precise location information may be unavailable due to the constraint in energy, ...
Kuei-Ping Shih, Sheng-Shih Wang
ISPAN
2005
IEEE
15 years 10 months ago
Supervised Peer-to-Peer Systems
In this paper we present a general methodology for designing supervised peer-to-peer systems. A supervised peer-to-peer system is a system in which the overlay network is formed b...
Kishore Kothapalli, Christian Scheideler
157
Voted
IWPSE
2005
IEEE
15 years 10 months ago
EvoLens: Lens-View Visualizations of Evolution Data
Visualizing software evolution is essential for identifying design erosions that have occurred over the past releases. Making evolutionary aspects explicit via visual representati...
Jacek Ratzinger, Michael Fischer, Harald Gall
KBSE
2005
IEEE
15 years 10 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
« Prev « First page 3996 / 4439 Last » Next »