Sciweavers

1885 search results - page 345 / 377
» Optimization of Component Connections for an Embedded Compon...
Sort
View
CEE
2007
110views more  CEE 2007»
14 years 9 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...

Publication
767views
16 years 8 months ago
Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in Computer Networks
Congestion avoidance mechanisms allow a network to operate in the optimal region of low delay and high throughput, thereby, preventing the network from becoming congested. This is ...
D. Chiu and R. Jain
ICIP
2000
IEEE
15 years 11 months ago
Nonlinear Distortion Correction in Endoscopic Video Images
Modern video-based endoscopes offer physicians a wide-angle field of view for minimally-invasive procedures. Unfortunately, inherent barrel distortion prevents accurate perception...
Chao Zhang, James P. Helferty, Geoffrey McLennan, ...
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
15 years 9 months ago
High-performance complex event processing over streams
In this paper, we present the design, implementation, and evaluation of a system that executes complex event queries over real-time streams of RFID readings encoded as events. The...
Eugene Wu 0002, Yanlei Diao, Shariq Rizvi
50
Voted
ICASSP
2009
IEEE
15 years 4 months ago
Automatic pronunciation verification of english letter-names for early literacy assessment of preliterate children
Children need to master reading letter-names and lettersounds before reading phrases and sentences. Pronunciation assessment of letter-names and letter-sounds read aloud is an imp...
Matthew Black, Joseph Tepperman, Abe Kazemzadeh, S...