Sciweavers

734 search results - page 118 / 147
» Power balanced pipelines
Sort
View
RTCSA
2005
IEEE
14 years 4 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...
DRM
2005
Springer
14 years 4 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
IWQOS
2005
Springer
14 years 4 months ago
Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks
Abstract. Object detection quality and network lifetime are two conflicting aspects of a sensor network, but both are critical to many sensor applications such as military surveil...
Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodo...
PDC
2004
ACM
14 years 4 months ago
Examining a planning discourse: how a manager represents issues within a planning frame and how the others could do the same
The aim of Participatory Design (PD) is to involve the users in the design. Even though the research has shown the success of PD projects in empowering users, little has been said...
Jarmo Sarkkinen
BIOADIT
2004
Springer
14 years 4 months ago
Media Streaming on P2P Networks with Bio-inspired Cache Replacement Algorithm
With the growth of computing power and the proliferation of broadband access to the Internet, the use of media streaming has become widely diffused. By using the P2P communication...
Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata, ...