Sciweavers

7066 search results - page 1397 / 1414
» Contact Relations with Applications
Sort
View
VTC
2010
IEEE
195views Communications» more  VTC 2010»
13 years 5 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...
CANDC
2009
ACM
13 years 5 months ago
Designing to support reasoned imagination through embodied metaphor
Supporting users' reasoned imagination in sense making during interaction with tangible and embedded computation involves supporting the application of their existing mental ...
Alissa Nicole Antle, Greg Corness, Saskia Bakker, ...
ICC
2009
IEEE
136views Communications» more  ICC 2009»
13 years 5 months ago
Maximizing the Sum Rate in Symmetric Networks of Interfering Links
We consider the power optimization problem of maximizing the sum rate of a symmetric network of interfering links in Gaussian noise. All transmitters have an average transmit power...
Sibi Raj Bhaskaran, Stephen V. Hanly, Nasreen Badr...
ICCAD
2009
IEEE
131views Hardware» more  ICCAD 2009»
13 years 5 months ago
Scheduling with soft constraints
In a behavioral synthesis system, a typical approach used to guide the scheduler is to impose hard constraints on the relative timing between operations considering performance, a...
Jason Cong, Bin Liu, Zhiru Zhang
ICCV
2009
IEEE
13 years 5 months ago
On optimizing subspaces for face recognition
We propose a subspace learning algorithm for face recognition by directly optimizing recognition performance scores. Our approach is motivated by the following observations: 1) Di...
Jilin Tu, Xiaoming Liu, Peter Henry Tu
« Prev « First page 1397 / 1414 Last » Next »