Sciweavers

1846 search results - page 296 / 370
» On improving application utility prediction
Sort
View
ENVSOFT
2006
144views more  ENVSOFT 2006»
14 years 12 months ago
Ten iterative steps in development and evaluation of environmental models
Models are increasingly being relied upon to inform and support natural resource management. They are incorporating an ever broader range of disciplines and now often confront peo...
Anthony J. Jakeman, Rebecca A. Letcher, John P. No...
IJNSEC
2008
113views more  IJNSEC 2008»
14 years 12 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
EJWCN
2011
197views more  EJWCN 2011»
14 years 6 months ago
Comparison among Cognitive Radio Architectures for Spectrum Sensing
Recently, the growing success of new wireless applications and services has led to overcrowded licensed bands, inducing the governmental regulatory agencies to consider more flex...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...
INFOCOM
2011
IEEE
14 years 3 months ago
Channel allocation in wireless data center networks
—Unbalanced traffic demands of different data center applications are an important issue in designing Data center networks (DCNs). In this paper, we present our exploratory inve...
Yong Cui, Hongyi Wang, Xiuzhen Cheng
BIRTHDAY
2012
Springer
13 years 7 months ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...