Sciweavers

12950 search results - page 2283 / 2590
» On Optimal Timed Strategies
Sort
View
ISCAS
2005
IEEE
173views Hardware» more  ISCAS 2005»
15 years 10 months ago
Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks
Abstract— The wireless sensor network is an emerging technology that may greatly facilitate human life by providing ubiquitous sensing, computing, and communication capability. H...
Chi-Fu Huang, Li-Chu Lo, Yu-Chee Tseng, Wen-Tsuen ...
138
Voted
ISCC
2005
IEEE
105views Communications» more  ISCC 2005»
15 years 10 months ago
Enhanced Protection Using Shared Segment Backups in a Multiservice GMPLS-Based Networks
The paper presents a novel protection methodology for setting protected paths in a multiservice GMPLSbased network scenario. By applying the proposed methods, label switched paths...
Anna Urra, Eusebi Calle, José-Luis Marzo
121
Voted
ISDA
2005
IEEE
15 years 10 months ago
Managing of Cooperative Genetic Algorithms by Intelligent Agent
Genetic Algorithms (GAs) are very popular optimization tool, although efficient applications of GAs requires users have problem with setting their parameters and used genetic ope...
Halina Kwasnicka, Magdalena Gierusz
ISQED
2005
IEEE
98views Hardware» more  ISQED 2005»
15 years 10 months ago
Wire Planning with Bounded Over-the-Block Wires
Hierarchical approach greatly facilitates large-scale chip design by hiding distracting details in low-level objects. However, the lowlevel designs have to have a global view of h...
Hua Xiang, I-Min Liu, Martin D. F. Wong
148
Voted
ITCC
2005
IEEE
15 years 10 months ago
Design Theoretic Approach to Replicated Declustering
Declustering techniques reduce query response times through parallel I/O by distributing data among multiple devices. Most of the research on declustering is targeted at spatial r...
Ali Saman Tosun
« Prev « First page 2283 / 2590 Last » Next »