Sciweavers

9186 search results - page 66 / 1838
» A Module System for Scheme
Sort
View
ICASSP
2008
IEEE
14 years 3 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu
ICDCS
2003
IEEE
14 years 2 months ago
Dynamic Module Replacement in Distributed Protocols
Dynamic module replacement — the ability to hot swap a component’s implementation at runtime — is fundamental to supporting evolutionary change in long-lived and highlyavail...
Nigamanth Sridhar, Scott M. Pike, Bruce W. Weide
ICASSP
2011
IEEE
13 years 27 days ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...
ISCAS
2008
IEEE
77views Hardware» more  ISCAS 2008»
14 years 3 months ago
Impulse based scheme for crystal-less ULP radios
—This study describes a method of implementing a fully integrated ultra-low-power (ULP) radio for wireless sensor networks (WSNs). This is achieved using an ad hoc modulation sch...
Fabio Sebastiano, Salvatore Drago, Lucien Breems, ...
DAC
2002
ACM
14 years 10 months ago
Scheduler-based DRAM energy management
Previous work on DRAM power-mode management focused on hardware-based techniques and compiler-directed schemes to explicitly transition unused memory modules to low-power operatin...
Victor Delaluz, Anand Sivasubramaniam, Mahmut T. K...