Sciweavers

18374 search results - page 3543 / 3675
» Applications for data hiding
Sort
View
ISCAS
2006
IEEE
169views Hardware» more  ISCAS 2006»
14 years 4 months ago
An Address-Event Image Sensor Network
We discuss an imaging architecture for sensor pixel in the ALOHA signals an event when a certain amount network applications, that employs a 32 x 32 Address-Event of photons are re...
Thiago Teixeira, Eugenio Culurciello, Andreas G. A...
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
14 years 4 months ago
Dynamic control of spinal locomotion circuits
We show that an ongoing locomotor pattern can that the physiology of the lamprey's spinal system generalizes to be modulated by application of discrete electrical stimuli to l...
R. Jacob Vogelstein, Ralph Etienne-Cummings, Nitis...
ISSRE
2006
IEEE
14 years 4 months ago
Queuing Models for Field Defect Resolution Process
This paper explores a novel application of queuing theory to the corrective software maintenance problem to support quantitative balancing between resources and responsiveness. In...
Swapna S. Gokhale, Robert E. Mullen
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 4 months ago
Virtually Pipelined Network Memory
We introduce virtually-pipelined memory, an architectural technique that efficiently supports high-bandwidth, uniform latency memory accesses, and high-confidence throughput eve...
Banit Agrawal, Timothy Sherwood
VTC
2006
IEEE
203views Communications» more  VTC 2006»
14 years 4 months ago
The 3G Long-Term Evolution - Radio Interface Concepts and Performance Evaluation
Abstract—3GPP is in the process of defining the long-term evolution (LTE) for 3G radio access, sometimes referred to as Super3G, in order to maintain the future competitiveness o...
Erik Dahlman, Hannes Ekström, Anders Furuskar...
« Prev « First page 3543 / 3675 Last » Next »