Sciweavers

1272 search results - page 37 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
ACMSE
2004
ACM
14 years 2 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
FPL
2004
Springer
75views Hardware» more  FPL 2004»
14 years 22 days ago
Wavelet-Based Image Compression on the Reconfigurable Computer ACE-V
Wavelet-based image compression has been suggested previously as a means to evaluate and compare both traditional and reconfigurable computers in terms of performance and resource ...
Hagen Gädke, Andreas Koch
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
14 years 3 months ago
Instance Data Evaluation for Semantic Web-Based Knowledge Management Systems
As semantic web technologies are increasingly used to empower knowledge management systems (KMSs), there is a growing need for mechanisms and automated tools for checking content ...
Jiao Tao, Li Ding, Deborah L. McGuinness
MMB
2001
Springer
141views Communications» more  MMB 2001»
14 years 1 months ago
Performance Analysis of the Random Access Protocol in TETRAPOL Trunked Radio Networks
This paper provides a performance evaluation of the TETRAPOL random access protocol. The results are based on a Markovian model which is also presented. The Markovian model is use...
Dirk Kuypers, Peter Sievering
PEPM
2011
ACM
12 years 12 months ago
Allocation removal by partial evaluation in a tracing JIT
The performance of many dynamic language implementations suffers from high allocation rates and runtime type checks. This makes dynamic languages less applicable to purely algorit...
Carl Friedrich Bolz, Antonio Cuni, Maciej FijaBkow...