Sciweavers

2656 search results - page 455 / 532
» Design and analysis of algorithms reconsidered
Sort
View
ICNP
2005
IEEE
14 years 2 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu
MM
2005
ACM
110views Multimedia» more  MM 2005»
14 years 2 months ago
Photo LOI: browsing multi-user photo collections
The number of digital photographs is growing beyond the abilities of individuals to easily manage and understand their own photo collections. Photo LOI (Level of Interest) is a te...
Rahul Nair, Nick Reid, Marc Davis
SENSYS
2005
ACM
14 years 2 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
EUROCAST
2005
Springer
182views Hardware» more  EUROCAST 2005»
14 years 2 months ago
Computer Vision Application: Real Time Smart Traffic Light
Abstract. The design, development, construction and testing of an ArtificialVision controlled Traffic-Light prototype has been carried out to rule and regulate intersections. Metho...
Ángel Serrano, Cristina Conde, Licesio J. R...
FPGA
2005
ACM
107views FPGA» more  FPGA 2005»
14 years 2 months ago
Instruction set extension with shadow registers for configurable processors
Configurable processors are becoming increasingly popular for modern embedded systems (especially for the field-programmable system-on-a-chip). While steady progress has been made...
Jason Cong, Yiping Fan, Guoling Han, Ashok Jaganna...