Sciweavers

653 search results - page 26 / 131
» The stepping stones project
Sort
View
JCSC
2002
87views more  JCSC 2002»
14 years 9 months ago
Power Estimator Development for Embedded System Memory Tuning
Memory accesses account for a large percentage of total power in microprocessor-based embedded systems. The increasing use of microprocessor cores and synthesis, rather than prefa...
Frank Vahid, Tony Givargis, Susan Cotterell
ACSAC
2007
IEEE
15 years 1 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
80
Voted
JCDL
2005
ACM
95views Education» more  JCDL 2005»
15 years 3 months ago
Resolving the unencoded character problem for chinese digital libraries
Constructing a Chinese digital library, especially for a historical article archiving, is often bothered by the small character sets supported by the current computer systems. Thi...
Derming Juang, Jenq-Haur Wang, Chen-Yu Lai, Ching-...
WSC
1997
14 years 10 months ago
Petri Net Based Simulation of Construction Schedules
Scheduling of a construction project requires: a) hierarchical decomposition of the project; b) incorporation of risk and uncertainty in the activity time and cost estimates; and ...
Anil Sawhney
ISCSCT
2008
IEEE
15 years 3 months ago
Image Rectification Using Affine Epipolar Geometric Constraint
—To rapidly and accurately search the corresponding points along scan-lines, rectification of stereo pairs are performed so that corresponding epipolar lines are parallel to the ...
Liansheng Sui, Jiulong Zhang, Duwu Cui