Sciweavers

1134 search results - page 150 / 227
» Optimizing Designs based on Risk Approach
Sort
View
DATE
2006
IEEE
113views Hardware» more  DATE 2006»
15 years 4 months ago
Automatic ADL-based operand isolation for embedded processors
Cutting-edge applications of future embedded systems demand highest processor performance with low power consumption to get acceptable battery-life times. Therefore, low power opt...
Anupam Chattopadhyay, B. Geukes, David Kammler, Er...
GECCO
2006
Springer
182views Optimization» more  GECCO 2006»
15 years 1 months ago
Distributed genetic algorithm for energy-efficient resource management in sensor networks
In this work we consider energy-efficient resource management in an environment monitoring and hazard detection sensor network. Our goal is to allocate different detection methods...
Qinru Qiu, Qing Wu, Daniel J. Burns, Douglas Holzh...
ICASSP
2011
IEEE
14 years 1 months ago
On the construction of low-pass filters on the unit sphere
This paper considers the problem of construction of low-pass filters on the unit sphere, which has wide ranging applications in the processing of signals on the unit sphere. We p...
Zubair Khalid, Salman Durrani, Rodney A. Kennedy, ...
PR
2006
119views more  PR 2006»
14 years 9 months ago
Fingerprint matching by genetic algorithms
Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. In this p...
Xuejun Tan, Bir Bhanu
ICDCS
2009
IEEE
15 years 4 months ago
Stochastic Multicast with Network Coding
The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource ...
Ajay Gopinathan, Zongpeng Li