Sciweavers

2358 search results - page 424 / 472
» Revisiting communication performance models for computationa...
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
FDL
2004
IEEE
14 years 16 days ago
SystemC and OCAPI-xl Based System-Level Design for Reconfigurable Systems-on-Chip
Reconfigurability is becoming an important part of System-on-Chip (SoC) design to cope with the increasing demands for simultaneous flexibility and computational power. Current ha...
Kari Tiensyrjä, Miroslav Cupák, Kostas...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 15 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
CSREAESA
2004
13 years 10 months ago
An Energy-Aware Synthesis Methodology for OS-Driven Multi-Process Embedded Software
The growing software content in various battery-driven embedded systems has led to significant interest in technologies for energy-efficient embedded software. While lowenergy sof...
Tat Kee Tan, Anand Raghunathan, Niraj K. Jha
JMM2
2006
99views more  JMM2 2006»
13 years 8 months ago
Spontaneous Emotional Facial Expression Detection
Change in a speaker's emotion is a fundamental component in human communication. Automatic recognition of spontaneous emotion would significantly impact human-computer interac...
Zhihong Zeng, Yun Fu, Glenn I. Roisman, Zhen Wen, ...