Sciweavers

3792 search results - page 700 / 759
» Techniques for Trusted Software Engineering
Sort
View
104
Voted
IOLTS
2008
IEEE
102views Hardware» more  IOLTS 2008»
15 years 7 months ago
Integrating Scan Design and Soft Error Correction in Low-Power Applications
— Error correcting coding is the dominant technique to achieve acceptable soft-error rates in memory arrays. In many modern circuits, the number of memory elements in the random ...
Michael E. Imhof, Hans-Joachim Wunderlich, Christi...
70
Voted
COMSWARE
2007
IEEE
15 years 6 months ago
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks
—Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. Neighboring devices elect one appropriate device as clusterhead. Due t...
Matthias R. Brust, Adrian Andronache, Steffen Roth...
115
Voted
DEEC
2007
IEEE
15 years 6 months ago
DeepBot: a focused crawler for accessing hidden web content
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is "hidden" behind the query forms of onli...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 6 months ago
An Experimental Design Approach for Optimizing SMSE Waveforms to Minimize Coexistent Interference
Abstract— An experimental design approach is used to determine which factors (design parameters) of Spectrally Modulated, Spectrally Encoded (SMSE) waveforms have the greatest im...
Todd W. Beard, Michael A. Temple, Marcus L. Robert...
130
Voted
ISORC
2007
IEEE
15 years 6 months ago
QoS Management of Real-Time Data Stream Queries in Distributed Environments
Many emerging applications operate on continuous unbounded data streams and need real-time data services. Providing deadline guarantees for queries over dynamic data streams is a ...
Yuan Wei, Vibha Prasad, Sang Hyuk Son