Sciweavers

292 search results - page 44 / 59
» Power Management Techniques for Control-Flow Intensive Desig...
Sort
View
CIT
2004
Springer
15 years 3 months ago
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder
Abstract. Both encryption and digital watermarking techniques need to be incorporated in a digital rights management framework to address different aspects of content management. W...
Saraju P. Mohanty, Renuka Kumara C., Sridhara Naya...
OSDI
2008
ACM
15 years 10 months ago
Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling
Computational RFIDs (CRFIDs) provide flexible, general-purpose computation on a microcontroller via energy that is harvested and stored in capacitors rather than batteries. Our co...
Benjamin Ransford, Shane S. Clark, Mastooreh Salaj...
RTCSA
2005
IEEE
15 years 3 months ago
Multi-Versions Data for Improvement of QoS in RTDBS
In current research toward the design of more powerful behavior of RTDBS under unpredictable workloads, different research groups focus their work on QoS (Quality of Service) guar...
Emna Bouazizi, Claude Duvallet, Bruno Sadeg
SIGUCCS
2004
ACM
15 years 3 months ago
Research based methods for using powerpoint, animation, and video for instruction
This paper is a literature review on practical techniques and guidelines using PowerPoint, animation, and video effectively for instruction. The motivation to collect research bas...
Trevor Murphy
IPSN
2011
Springer
14 years 1 months ago
Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels
Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a ke...
Matteo Ceriotti, Michele Corrà, Leandro D'O...