Sciweavers

669 search results - page 87 / 134
» New Constraint Programming Approaches for the Computation of...
Sort
View
SIGCSE
2010
ACM
203views Education» more  SIGCSE 2010»
13 years 8 months ago
An approach to integrating ICTD projects into an undergraduate curriculum
Applying information and communication technologies to development (ICTD) is emerging as an interesting and motivating research area in computer science and engineering. It spans ...
Richard J. Anderson, Ruth E. Anderson, Gaetano Bor...
PATMOS
2007
Springer
14 years 2 months ago
Soft Error-Aware Power Optimization Using Gate Sizing
—Power consumption has emerged as the premier and most constraining aspect in modern microprocessor and application-specific designs. Gate sizing has been shown to be one of the...
Foad Dabiri, Ani Nahapetian, Miodrag Potkonjak, Ma...
ICDCSW
2005
IEEE
14 years 2 months ago
Mobile Proxies for Proactive Buffering in Wireless Internet Multimedia Streaming
The widespread popularity of roaming wireless devices with limited and heterogeneous capabilities is enabling new challenging deployment scenarios for multimedia streaming in wire...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
ICCV
2009
IEEE
15 years 1 months ago
Image Segmentation with A Bounding Box Prior
User-provided object bounding box is a simple and popular interaction paradigm considered by many existing interactive image segmentation frameworks. However, these frameworks t...
Victor Lempitsky, Pushmeet Kohli, Carsten Rother, ...
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 8 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi