Sciweavers

135 search results - page 9 / 27
» Constrained physical design tuning
Sort
View
ICCNMC
2005
Springer
14 years 3 months ago
Sensor Network Configuration Under Physical Attacks
— In this paper, we address a sensor network lifetime problem that maintains a certain throughput in an environment where physical node destruction is possible. While lifetime is...
Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellapp...
DAC
2006
ACM
14 years 10 months ago
Fast algorithms for slew constrained minimum cost buffering
As a prevalent constraint, sharp slew rate is often required in circuit design which causes a huge demand for buffering resources. This problem requires ultra-fast buffering techn...
Shiyan Hu, Charles J. Alpert, Jiang Hu, Shrirang K...
FGCN
2008
IEEE
116views Communications» more  FGCN 2008»
14 years 4 months ago
Routing in Degree-Constrained FSO Mesh Networks
This paper addresses the routing problem in packet switching free-space optical (FSO) mesh networks. FSO mesh networks are emerging as broadband communication networks because of ...
Ziping Hu, Pramode K. Verma, James J. Sluss Jr.
ECBS
2004
IEEE
102views Hardware» more  ECBS 2004»
14 years 1 months ago
WASP: A Radio Geolocation System on Highly Resource Constrained Mobile Platforms
In recent years, there has been an increased need for surveillance capabilities in both civilian and military arenas. Mobile unmanned sensor fleets have long been envisioned as a ...
Kumar Chhokra, Ted Bapty, Jason Scott, Simon Winbe...
ACISP
2006
Springer
14 years 3 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros