Sciweavers

1710 search results - page 264 / 342
» High-Level Programs and Program Conditions
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Efficient Tag Identification in Mobile RFID Systems
In this paper we consider how to efficiently identify tags on the moving conveyor. Considering conditions like the path loss and multi-path effect in realistic settings, we first p...
Lei Xie, Bo Sheng, Chiu Chiang Tan, Hao Han, Qun L...
MSV
2010
13 years 7 months ago
Simulating and Visualising Sedimentary Cluster-Cluster Aggregation
Recent simulations of diffusion limited cluster-cluster aggregation (DLCA) have shown systematic inhomogeneities in the shape and orientation of clusters formed when a sedimentary...
Ken A. Hawick
ERSA
2009
109views Hardware» more  ERSA 2009»
13 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
ICANN
2009
Springer
13 years 7 months ago
MINLIP: Efficient Learning of Transformation Models
Abstract. This paper studies a risk minimization approach to estimate a transformation model from noisy observations. It is argued that transformation models are a natural candidat...
Vanya Van Belle, Kristiaan Pelckmans, Johan A. K. ...
CDC
2010
IEEE
118views Control Systems» more  CDC 2010»
13 years 4 months ago
Distributed scheduling for air traffic throughput maximization during the terminal phase of flight
FAA's NextGen program aims at increasing the capacity of the national airspace, while ensuring the safety of aircraft. This paper provides a distributed merging and spacing al...
Rahul Chipalkatty, Philip Twu, Amir Rahmani, Magnu...