Sciweavers

14190 search results - page 2652 / 2838
» computing 2008
Sort
View
101
Voted
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 3 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...
SWARM
2008
SPRINGER
222views Optimization» more  SWARM 2008»
15 years 3 months ago
Biologically inspired redistribution of a swarm of robots among multiple sites
We present a biologically inspired approach to the dynamic assignment and reassignment of a homogeneous swarm of robots to multiple locations, which is relevant to applications lik...
M. Ani Hsieh, Ádám M. Halász,...
170
Voted
TC
2008
15 years 3 months ago
A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking
As one of the fundamental issues in wireless sensor networks (WSNs), the sensor localization problem has recently received extensive attention. In this work, we investigate this pr...
Liqiang Zhang, Qiang Cheng, Yingge Wang, Sherali Z...
143
Voted
TC
2008
15 years 3 months ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang
TC
2008
15 years 3 months ago
Throughput-Buffering Trade-Off Exploration for Cyclo-Static and Synchronous Dataflow Graphs
Multimedia applications usually have throughput constraints. An implementation must meet these constraints, while it minimizes resource usage and energy consumption. The compute in...
Sander Stuijk, Marc Geilen, Twan Basten
« Prev « First page 2652 / 2838 Last » Next »