Sciweavers

1240 search results - page 198 / 248
» Composition with Target Constraints
Sort
View
EUC
2005
Springer
14 years 3 months ago
On Tools for Modeling High-Performance Embedded Systems
Abstract. Most of the new embedded systems require high performance processors at low power. To cater to these needs, most semiconductor companies are designing multi-core processo...
Anilkumar Nambiar, Vipin Chaudhary
HM
2005
Springer
140views Optimization» more  HM 2005»
14 years 3 months ago
Fast Ejection Chain Algorithms for Vehicle Routing with Time Windows
Abstract. This paper introduces a new algorithm, based on the concept of ejection chains, to effectively target vehicle routing problems with time window constraints (VRPTW). Ejec...
Herman Sontrop, Pieter van der Horn, Marc Uetz
IPSN
2005
Springer
14 years 3 months ago
Towards optimal sleep scheduling in sensor networks for rare-event detection
— Lifetime maximization is one key element in the design of sensor-network-based surveillance applications. We propose a protocol for node sleep scheduling that guarantees a boun...
Qing Cao, Tarek F. Abdelzaher, Tian He, John A. St...
MM
2004
ACM
277views Multimedia» more  MM 2004»
14 years 3 months ago
Avatar-mediated face tracking and lip reading for human computer interaction
Advanced human computer interaction requires automatic reading of human face in order to make the computer interact with human in the same way as human-to-human communication. We ...
Xiaozhou Wei, Lijun Yin, Zhiwei Zhu, Qiang Ji
SACMAT
2004
ACM
14 years 3 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...