Sciweavers

285 search results - page 12 / 57
» Making Fourier-envelope simulation robust
Sort
View
PARLE
1994
13 years 12 months ago
Using Reference Counters in Update-Based Coherent Memory
Abstract. As the disparity between processor and memory speed continues to widen, the exploitation of locality of reference in shared-memory multiprocessors becomes an increasingly...
Evangelos P. Markatos, Catherine E. Chronaki
WSC
2007
13 years 10 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
ICRA
2005
IEEE
125views Robotics» more  ICRA 2005»
14 years 1 months ago
A Robust Localization Algorithm for Mobile Robots with Laser Range Finders
– We present a robust localization algorithm for mobile robots with laser range finders, which takes featurebased approach for reliable matching process as well as pointbased app...
Hee Jin Sohn, Byung Kook Kim
ICC
2007
IEEE
155views Communications» more  ICC 2007»
14 years 2 months ago
On Supporting Robust Voice Multicasting Over Ad Hoc Wireless Networks
Abstract— In this paper, we address the problem of voice multicasting in ad hoc wireless networks. The unique characteristics of voice traffic (viz. small packet size, high pack...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
BROADNETS
2006
IEEE
14 years 1 months ago
Robust Demand-Driven Video Multicast over Ad hoc Wireless Networks
Abstract— In this paper, we address the problem of video multicasting in ad hoc wireless networks. The salient characteristics of video traffic make conventional multicasting pr...
D. Agrawal, Tamma Bheemarjuna Reddy, C. Siva Ram M...