Sciweavers

828 search results - page 131 / 166
» Bounded Hairpin Completion
Sort
View
IJAHUC
2007
111views more  IJAHUC 2007»
13 years 9 months ago
Configuring node status in a two-phase tightly integrated mode for wireless sensor networks
: In wireless sensor networks, one of the main design challenges is to save severely constrained energy resources and obtain a long system lifetime. Low cost of sensors enables us ...
Di Tian, Zhijun Lei, Nicolas D. Georganas
IVC
2007
102views more  IVC 2007»
13 years 9 months ago
Analysis of the rubberband algorithm
We consider simple cube-curves in the orthogonal 3D grid of cells. The union of all cells contained in such a curve (also called the tube of this curve) is a polyhedrally bounded s...
Fajie Li, Reinhard Klette
TOG
2008
114views more  TOG 2008»
13 years 9 months ago
Single image tree modeling
In this paper, we introduce a simple sketching method to generate a realistic 3D tree model from a single image. The user draws at least two strokes in the tree image: the first c...
Ping Tan, Tian Fang, Jianxiong Xiao, Peng Zhao, Lo...
TPDS
2008
169views more  TPDS 2008»
13 years 9 months ago
Dynamic Resource Management in Energy Constrained Heterogeneous Computing Systems Using Voltage Scaling
An ad hoc grid is a wireless heterogeneous computing environment without a fixed infrastructure. This study considers wireless devices that have different capabilities, have limite...
Jong-Kook Kim, Howard Jay Siegel, Anthony A. Macie...
JNCA
2007
75views more  JNCA 2007»
13 years 9 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du