Sciweavers

1040 search results - page 172 / 208
» Resource Usage Verification
Sort
View
IJES
2008
130views more  IJES 2008»
14 years 9 months ago
Deriving efficient control in Process Networks with Compaan/Laura
: At Leiden Embedded Research Center (LERC), we are building a tool chain called Compaan/Laura that allows us to map rapidly and efficiently signal processing applications written ...
Steven Derrien, Alexandru Turjan, Claudiu Zissules...
IJNSEC
2008
160views more  IJNSEC 2008»
14 years 9 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
IVS
2006
240views more  IVS 2006»
14 years 9 months ago
Business process impact visualization and anomaly detection
Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes ...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, J&oum...
JRTIP
2008
249views more  JRTIP 2008»
14 years 9 months ago
Model-based mapping of reconfigurable image registration on FPGA platforms
Abstract Image registration is a computationally intensive application in the medical imaging domain that places stringent requirements on performance and memory management efficie...
Mainak Sen, Yashwanth Hemaraj, William Plishker, R...
JSAC
2008
135views more  JSAC 2008»
14 years 9 months ago
Multi-Stage Pricing Game for Collusion-Resistant Dynamic Spectrum Allocation
In order to fully utilize scarce spectrum resources, dynamic spectrum allocation becomes a promising approach to increase the spectrum efficiency for wireless networks. However, th...
Zhu Ji, K. J. Ray Liu