Sciweavers

993 search results - page 152 / 199
» Classification Reliability and Its Use in Multi-classifier S...
Sort
View
ICCD
2003
IEEE
113views Hardware» more  ICCD 2003»
14 years 4 months ago
Exploiting Microarchitectural Redundancy For Defect Tolerance
Continued advancements in fabrication technology and reductions in feature size create challenges in maintaining both manufacturing yield rates and long-term reliability of device...
Premkishore Shivakumar, Stephen W. Keckler, Charle...
ICC
2007
IEEE
340views Communications» more  ICC 2007»
14 years 1 months ago
A Decentralized Positioning Method for Wireless Sensor Networks Based on Weighted Interpolation
— A decentralized sensor positioning algorithm is proposed using an adaptive weighted-interpolation method. The proposed method utilizes in-network processing among sensors to co...
Chin-Liang Wang, Yao-Win Hong, Yu-Sheng Dai
ICC
2007
IEEE
101views Communications» more  ICC 2007»
14 years 1 months ago
Range-based Mobility Estimations in MANETs with Application to Link Availability Prediction
— The quality of communications in mobile ad-hoc networks is largely determined by the topological stability. Characterizing the mobility of mobile nodes (e.g. how often they mov...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor
MODELS
2007
Springer
14 years 1 months ago
Useware Modeling for Ambient Intelligent Production Environments
The impact of user interface quality has grown in software systems engineering, and will grow further with upcoming new paradigms such as Ambient Intelligence or Ubiquitous Comput...
Daniel Görlich, Kai Breiner
IH
2005
Springer
14 years 1 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis