Sciweavers

12264 search results - page 2258 / 2453
» Analysis of the rubberband algorithm
Sort
View
VTC
2010
IEEE
174views Communications» more  VTC 2010»
15 years 2 months ago
An Opportunistic Spectrum Scheduling Scheme for Multi-Channel Cognitive Radio Networks
—In this paper, we develop an opportunistic spectrum scheduling scheme for cognitive radio networks. In the proposed scheme, the channel status (i.e., whether being occupied by p...
Vamsi Krishna Tumuluru, Ping Wang, Dusit Niyato
WCRE
2010
IEEE
15 years 2 months ago
Understanding Feature Evolution in a Family of Product Variants
Existing software product variants, developed by ad hoc reuse such as copy-paste-modify, are often a starting point for building Software Product Line (SPL). Understanding of how ...
Yinxing Xue, Zhenchang Xing, Stan Jarzabek
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 2 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
ACSD
2010
IEEE
224views Hardware» more  ACSD 2010»
15 years 2 months ago
Robustness of Sequential Circuits
Digital components play a central role in the design of complex embedded systems. These components are interconnected with other, possibly analog, devices and the physical environm...
Laurent Doyen, Thomas A. Henzinger, Axel Legay, De...
ASAP
2010
IEEE
315views Hardware» more  ASAP 2010»
15 years 2 months ago
A compact FPGA-based architecture for elliptic curve cryptography over prime fields
Abstract--This paper proposes an FPGA-based applicationspecific elliptic curve processor over a prime field. This research targets applications for which compactness is more import...
Jo Vliegen, Nele Mentens, Jan Genoe, An Braeken, S...
« Prev « First page 2258 / 2453 Last » Next »