Sciweavers

4330 search results - page 776 / 866
» Analyzing security architectures
Sort
View
148
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Buffer management for multi-application image processing on multi-core platforms: Analysis and case study
Due to the limited amounts of on-chip memory, large volumes of data, and performance and power consumption overhead associated with interprocessor communication, efficient managem...
Dong-Ik Ko, Nara Won, Shuvra S. Bhattacharyya
119
Voted
ASAP
2007
IEEE
153views Hardware» more  ASAP 2007»
15 years 3 months ago
Performance Evaluation of Adaptive Routing Algorithms for achieving Fault Tolerance in NoC Fabrics
Commercial designs are integrating from 10 to 100 embedded functional and storage blocks in a single system on chip (SoC) currently, and the number is likely to increase significa...
Haibo Zhu, Partha Pratim Pande, Cristian Grecu
COMCOM
2010
133views more  COMCOM 2010»
15 years 3 months ago
Supporting mobility in an IMS-based P2P IPTV service: A proactive context transfer mechanism
In recent years, IPTV has received an increasing amount of interest from the industry, commercial providers and the research community, alike. In this context, standardization bod...
Iván Vidal, Jaime García-Reinoso, An...
109
Voted
CGF
2008
85views more  CGF 2008»
15 years 3 months ago
Agile Spectrum Imaging: Programmable Wavelength Modulation for Cameras and Projectors
We advocate the use of quickly-adjustable, computer-controlled color spectra in photography, lighting and displays. We present an optical relay system that allows mechanical or el...
Ankit Mohan, Ramesh Raskar, Jack Tumblin
135
Voted
COMCOM
2008
154views more  COMCOM 2008»
15 years 3 months ago
Analysis of hybrid P2P overlay network topology
Modeling peer-to-peer (P2P) networks is a challenge for P2P researchers. In this paper, we provide a detailed analysis of large-scale hybrid P2P overlay network topology, using Gn...
Chao Xie, Guihai Chen, Art Vandenberg, Yi Pan