Sciweavers

1527 search results - page 265 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
WSTFEUS
2003
IEEE
14 years 1 months ago
DOLPHIN: An Autonomous Indoor Positioning System in Ubiquitous Computing Environment
Determining physical location of indoor objects is one of the key issues in development of context-aware applications in ubiquitous computing environment. This is mainly because c...
Yasuhiro Fukuju, Masateru Minami, Hiroyuki Morikaw...
DATE
2010
IEEE
132views Hardware» more  DATE 2010»
14 years 25 days ago
Programmable aging sensor for automotive safety-critical applications
- Electronic systems for safety-critical automotive applications must operate for many years in harsh environments. Reliability issues are worsening with device scaling down, while...
Julio César Vázquez, Víctor H...
IH
2001
Springer
14 years 5 days ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
ICVS
1999
Springer
14 years 12 hour ago
Face-Tracking and Coding for Video Compression
While computing power and transmission bandwidth have both been steadily increasing over the last few years, bandwidth rather than processing power remains the primary bottleneck f...
William E. Vieux, Karl Schwerdt, James L. Crowley
FOCS
1994
IEEE
13 years 12 months ago
A Spectral Approach to Lower Bounds
We establish a nonlinear lower bound for halfplane range searching over a group. Specifically, we show that summing up the weights of n (weighted) points within n halfplanes requir...
Bernard Chazelle