Sciweavers

1852 search results - page 323 / 371
» From Bi-ideals to Periodicity
Sort
View
ASPDAC
2008
ACM
168views Hardware» more  ASPDAC 2008»
13 years 10 months ago
A fast two-pass HDL simulation with on-demand dump
- Simulation-based functional verification is characterized by two inherently conflicting targets: the signal visibility and simulation performance. Achieving a proper trade-off be...
Kyuho Shim, Youngrae Cho, Namdo Kim, Hyuncheol Bai...
ICDCS
2010
IEEE
13 years 10 months ago
Using Analog Network Coding to Improve the RFID Reading Throughput
Abstract—RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the t...
Ming Zhang, Tao Li, Shigang Chen, Bo Li
NOSSDAV
2010
Springer
13 years 10 months ago
Wireless network interface energy conservation for bottlenecked first mile networks
Placeshifting systems stream videos from the home to a single remote user using the limited upstream capacity of the home broadband link. We analyze the behavior of two placeshift...
Surendar Chandra
CIVR
2008
Springer
127views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Investigating keyframe selection methods in the novel domain of passively captured visual lifelogs
The SenseCam is a passive capture wearable camera, worn around the neck, and when worn continuously it takes an average of 1,900 images per day. It can be used to create a persona...
Aiden R. Doherty, Daragh Byrne, Alan F. Smeaton, G...
ESEM
2008
ACM
13 years 10 months ago
Iterative identification of fault-prone binaries using in-process metrics
Code churn, the amount of code change taking place within a software unit over time, has been correlated with fault-proneness in software systems. We investigate the use of code c...
Lucas Layman, Gunnar Kudrjavets, Nachiappan Nagapp...