Sciweavers

461 search results - page 57 / 93
» Fundamentals of concern manipulation
Sort
View
ISCA
2007
IEEE
192views Hardware» more  ISCA 2007»
14 years 1 months ago
Analysis of redundancy and application balance in the SPEC CPU2006 benchmark suite
The recently released SPEC CPU2006 benchmark suite is expected to be used by computer designers and computer architecture researchers for pre-silicon early design analysis. Partia...
Aashish Phansalkar, Ajay Joshi, Lizy Kurian John
MIDDLEWARE
2007
Springer
14 years 1 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka
SCIA
2007
Springer
134views Image Analysis» more  SCIA 2007»
14 years 1 months ago
Estimation of Non-Cartesian Local Structure Tensor Fields
Abstract. In medical imaging, signals acquired in non-Cartesian coordinate systems are common. For instance, CT and MRI often produce significantly higher resolution within scan p...
Björn Svensson, Anders Brun, Mats T. Andersso...
GLOBECOM
2006
IEEE
14 years 1 months ago
Bounds on the Lifetime of Wireless Sensor Networks Employing Multiple Data Sinks
Abstract—Employing multiple base stations is an attractive approach to enhance the lifetime of wireless sensor networks. In this paper, we address the fundamental question concer...
Amar P. Azad, Ananthanarayanan Chockalingam
INFOCOM
2006
IEEE
14 years 1 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya