Sciweavers

1626 search results - page 266 / 326
» Subtyping with Power Types
Sort
View
208
Voted
LCN
2008
IEEE
15 years 10 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
131
Voted
RTAS
2008
IEEE
15 years 10 months ago
A Hybrid DVS Scheme for Interactive 3D Games
Interactive 3D games are now widely available on a variety of mobile devices for which battery-life is a major concern. Many of these devices support voltage/frequencyscalable pro...
Yan Gu, Samarjit Chakraborty
145
Voted
DDECS
2007
IEEE
201views Hardware» more  DDECS 2007»
15 years 10 months ago
Built in Defect Prognosis for Embedded Memories
: As scan compression replaces the traditional scan it is important to understand how it works with power. DFT MAX represents one of the two primary scan compression solutions used...
Prashant Dubey, Akhil Garg, Sravan Kumar Bhaskaran...
157
Voted
CIVR
2007
Springer
231views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Classification of video events using 4-dimensional time-compressed motion features
Among the various types of semantic concepts modeled, events pose the greatest challenge in terms of computational power needed to represent the event and accuracy that can be ach...
Alexander Haubold, Milind R. Naphade
133
Voted
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 9 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq