Sciweavers

5687 search results - page 145 / 1138
» Visualizing Evaluation in Scheme
Sort
View
USS
2004
14 years 11 months ago
On User Choice in Graphical Password Schemes
Graphical password schemes have been proposed as an alternative to text passwords in applications that support graphics and mouse or stylus entry. In this paper we detail what is,...
Darren Davis, Fabian Monrose, Michael K. Reiter
RA
2003
130views Robotics» more  RA 2003»
14 years 11 months ago
A Parallel Solution Scheme of Inverse Dynamics for Flexible Manipulators
In this paper, we describe a parallel solution scheme of inverse dynamics, and its application to flexible manipulators where elastic deformation and vibration normally occur in c...
Daigoro Isobe, Daisaku Imaizumi
JSAC
2011
215views more  JSAC 2011»
14 years 5 months ago
Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks
—We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to tra...
Xi Zhang, Hang Su
ICPP
2008
IEEE
15 years 4 months ago
Memory Access Scheduling Schemes for Systems with Multi-Core Processors
On systems with multi-core processors, the memory access scheduling scheme plays an important role not only in utilizing the limited memory bandwidth but also in balancing the pro...
Hongzhong Zheng, Jiang Lin, Zhao Zhang, Zhichun Zh...
WCNC
2008
IEEE
15 years 4 months ago
A Low Latency Scheme for Bulk RFID Tag Reading
—Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. These transmitted signals, or IDs, may collide if multiple tags transmit their I...
Erik F. Golen, Nirmala Shenoy, Xiaojun Cao