Sciweavers

1329 search results - page 219 / 266
» Phantom faces for face analysis
Sort
View
INFOCOM
2000
IEEE
14 years 1 months ago
A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols
Abstract—In this paper we investigate the performance of multicast routing protocols in wireless mobile ad hoc networks. An ad hoc network is composed of mobile nodes without the...
Sung-Ju Lee, William Su, Julian Hsu, Mario Gerla, ...
VLSID
2000
IEEE
102views VLSI» more  VLSID 2000»
14 years 1 months ago
Inductance Characterization of Small Interconnects Using Test-Signal Method
The test signal method can be used to measure and model inductance parameters (self and mutual) of a very small interconnect especially in highdensity IC’s by using a test signa...
Jeegar Tilak Shah, Madhav P. Desai, Sugata Sanyal
AHS
2007
IEEE
239views Hardware» more  AHS 2007»
14 years 1 months ago
Separation of Data flow and Control flow in Reconfigurable Multi-core SoCs using the Gannet Service-based Architecture
This paper presents a mechanism for the separation of control and data flow in NoC-based SoCs consisting of multiple heterogeneous reconfigurable IP cores. This mechanism enables ...
Wim Vanderbauwhede
EATIS
2007
ACM
14 years 1 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
ACMIDC
2009
14 years 29 days ago
How children search the internet with keyword interfaces
Children are among the most frequent users of the Internet, yet searching and browsing the web can present many challenges. Studies over the past two decades on how children searc...
Allison Druin, Elizabeth Foss, Leshell Hatley, Eva...