Sciweavers

260 search results - page 22 / 52
» Blocked Clause Elimination
Sort
View
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
PCM
2005
Springer
117views Multimedia» more  PCM 2005»
14 years 1 months ago
A Robust Text Segmentation Approach in Complex Background Based on Multiple Constraints
In this paper we propose a robust text segmentation method in complex background. The proposed method first utilizes the K-means algorithm to decompose a detected text block into ...
Libo Fu, Weiqiang Wang, Yaowen Zhan
DMS
2010
155views Multimedia» more  DMS 2010»
13 years 6 months ago
Ontological Filters for Slow Intelligence Systems
: Slow Intelligence Systems are general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptatio...
Shi-Kuo Chang, Emilio Zegarra, Chia Chun Shih, Tin...
ASPDAC
2005
ACM
111views Hardware» more  ASPDAC 2005»
14 years 1 months ago
Fast floorplanning by look-ahead enabled recursive bipartitioning
A new paradigm is introduced for floorplanning any combination of fixed-shape and variable-shape blocks under tight fixedoutline area constraints and a wirelength objective. Dra...
Jason Cong, Michail Romesis, Joseph R. Shinnerl
COMCOM
2007
79views more  COMCOM 2007»
13 years 7 months ago
Performance implications of a bounded receive buffer in concurrent multipath transfer
— We study the performance of Concurrent Multipath Transfer using SCTP multihoming (CMT) in the presence of a bounded receive buffer (rbuf). We demonstrate using simulation that ...
Janardhan R. Iyengar, Paul D. Amer, Randall R. Ste...