Sciweavers

2116 search results - page 229 / 424
» Resource Analysis by Sup-interpretation
Sort
View
PERCOM
2007
ACM
16 years 4 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
DCC
2008
IEEE
16 years 4 months ago
Sublinear Recovery of Sparse Wavelet Signals
There are two main classes of decoding algorithms for "compressed sensing," those which run time time polynomial in the signal length and those which use sublinear resou...
Ray Maleh, Anna C. Gilbert
ICCD
2007
IEEE
179views Hardware» more  ICCD 2007»
16 years 1 months ago
Energy-aware co-processor selection for embedded processors on FPGAs
In this paper, we present co-processor selection problem for minimum energy consumption in hw/sw co-design on FPGAs with dual power mode. We provide theoretical analysis for the p...
Amir Hossein Gholamipour, Elaheh Bozorgzadeh, Suda...
CCECE
2009
IEEE
15 years 11 months ago
Application layer optimization for efficient video streaming over IEEE 802.11 based wireless networks
— Most of the existing video streaming systems employ the worst case analysis in application layer buffer size dimensioning. Even though the worst case buffer size dimensioning p...
Azfar Moid, Abraham O. Fapojuwo
IAT
2009
IEEE
15 years 11 months ago
Opinion Mining on Newspaper Quotations
— Opinion mining is the task of extracting from a set of documents opinions expressed by a source on a specified target. This article presents a comparative study on the methods ...
Alexandra Balahur, Ralf Steinberger, Erik Van der ...