Sciweavers

1141 search results - page 196 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
ESAS
2004
Springer
15 years 9 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
MM
2010
ACM
251views Multimedia» more  MM 2010»
15 years 4 months ago
A cognitive approach for effective coding and transmission of 3D video
Reliable delivery of 3D video contents to a wide set of users is expected to be the next big revolution in multimedia applications provided that it is possible to grant a certain ...
Simone Milani, Giancarlo Calvagno
JCDL
2004
ACM
128views Education» more  JCDL 2004»
15 years 9 months ago
Panorama: extending digital libraries with topical crawlers
A large amount of research, technical and professional documents are available today in digital formats. Digital libraries are created to facilitate search and retrieval of inform...
Gautam Pant, Kostas Tsioutsiouliklis, Judy Johnson...
PERVASIVE
2010
Springer
15 years 6 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
HPCA
2006
IEEE
16 years 4 months ago
BulletProof: a defect-tolerant CMP switch architecture
As silicon technologies move into the nanometer regime, transistor reliability is expected to wane as devices become subject to extreme process variation, particle-induced transie...
Kypros Constantinides, Stephen Plaza, Jason A. Blo...