Sciweavers

8468 search results - page 1367 / 1694
» The Technology of Data Stashing
Sort
View
CISS
2007
IEEE
15 years 5 months ago
Bounding A Statistical Measure Of Network Lifetime For Wireless Sensor Networks
—The inherent many-to-one flow of traffic in Wireless Sensor Networks produces a skewed distribution of energy consumption rates leading to the early demise of those sensors that...
Muhammad Usman Ilyas, Hayder Radha
CISS
2007
IEEE
15 years 5 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid
CISS
2007
IEEE
15 years 5 months ago
System-Level Performance of Cellular Multihop Relaying with Multiuser Scheduling
— Multihop relaying in cellular networks is seen as a viable strategy to address the need for higher data rates and better coverage. In this paper, we analyze the system-level pe...
Mohamad Charafeddine, Ozgur Oyman, Sumeet Sandhu
DASFAA
2007
IEEE
143views Database» more  DASFAA 2007»
15 years 5 months ago
Using Redundant Bit Vectors for Near-Duplicate Image Detection
Images are amongst the most widely proliferated form of digital information due to affordable imaging technologies and the Web. In such an environment, the use of digital watermar...
Jun Jie Foo, Ranjan Sinha
DFT
2007
IEEE
112views VLSI» more  DFT 2007»
15 years 5 months ago
Estimation of Electromigration-Aggravating Narrow Interconnects Using a Layout Sensitivity Model
During semiconductor manufacturing, particles undesirably depose on the surface of the wafer causing “open” and “short” defects to interconnects. In this paper, a third ty...
Rani S. Ghaida, Payman Zarkesh-Ha
« Prev « First page 1367 / 1694 Last » Next »