Sciweavers

3712 search results - page 571 / 743
» Role-Based Access Control
Sort
View
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
IEEECIT
2006
IEEE
15 years 8 months ago
A Consistency Maintenance Approach in Replicated Services
Service-oriented architecture (SOA) making the interactions between applications much easier, but the service delay and unstable network will block the whole business process. Rep...
Jiangming Yang, Qiwei Zhang, Ning Gu
INFOCOM
2006
IEEE
15 years 8 months ago
Effective Packet Scheduling with Fairness Adaptation in Ultra Wideband Wireless Networks
Abstract— The inherent spread spectrum nature in ultrawideband (UWB) communications can support simultaneous transmissions. Two nearby transmissions do not collide, but rather ge...
Hai Jiang, Weihua Zhuang
ISVLSI
2006
IEEE
104views VLSI» more  ISVLSI 2006»
15 years 8 months ago
Adaptive Signal Processing in Mixed-Signal VLSI with Anti-Hebbian Learning
We describe analog and mixed-signal primitives for implementing adaptive signal-processing algorithms in VLSI based on anti-Hebbian learning. Both on-chip calibration techniques a...
Miguel Figueroa, Esteban Matamala, Gonzalo Carvaja...
LCN
2006
IEEE
15 years 8 months ago
Bandwidth Aware Slot Allocation in Hybrid MAC
— Hybrid Medium Access Control (MAC) protocols combine the strength of random and schedule based MAC schemes. From random MAC schemes, Hybrid MAC protocols borrow flexibility an...
Yuvraj. K. Rana, Bao Hua Liu, Alfandika Nyandoro, ...