Sciweavers

1783 search results - page 292 / 357
» Provenance and Data Synchronization
Sort
View
115
Voted
VTC
2008
IEEE
113views Communications» more  VTC 2008»
15 years 10 months ago
Non-Linear UWB Receivers with MLSE Post-Detection
— A wireless body area network with an average throughput of 500 kbps is considered based on ultra-wideband (UWB) pulse position modulation. For a long battery autonomy ultra low...
Florian Troesch, Thomas Zasowski, Armin Wittneben
CLUSTER
2007
IEEE
15 years 10 months ago
The design of MPI based distributed shared memory systems to support OpenMP on clusters
— OpenMP can be supported in cluster environments by using distributed shared memory (DSM) systems. A portable approach for building DSM systems is to layer it on MPI. With these...
H'sien J. Wong, Alistair P. Rendell
FDL
2007
IEEE
15 years 10 months ago
Mapping Actor-Oriented Models to TLM Architectures
Actor-oriented modeling approaches are convenient for implementing functional models of embedded systems. Architectural models for heterogeneous system-on-chip architectures, howe...
Jens Gladigau, Christian Haubelt, Bernhard Niemann...
ICASSP
2007
IEEE
15 years 10 months ago
Image-Based Frame Gating of IVUS Pullbacks: A Surrogate for ECG
Intravascular ultrasound (IVUS) is a catheter-based modality which is used to produce high-resolution, cross-sectional images of the interior of blood vessels. By capturing 2-D IV...
Sean M. O'Malley, Stephane G. Carlier, Morteza Nag...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 10 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana