Sciweavers

943 search results - page 154 / 189
» Simulation based deadlock analysis for system level designs
Sort
View
CASES
2003
ACM
14 years 2 months ago
AES and the cryptonite crypto processor
CRYPTONITE is a programmable processor tailored to the needs of crypto algorithms. The design of CRYPTONITE was based on an in-depth application analysis in which standard crypto ...
Dino Oliva, Rainer Buchty, Nevin Heintze
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 3 months ago
A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks
— Wireless sensor networks have been deployed for various critical monitoring applications in hostile environments such as monitoring the concentration levels of hazardous gas sp...
Vinod Shukla, Daji Qiao
MM
2004
ACM
109views Multimedia» more  MM 2004»
14 years 2 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
TIP
2010
111views more  TIP 2010»
13 years 3 months ago
Green Noise Digital Halftoning With Multiscale Error Diffusion
Multiscale error diffusion (MED) is superior to conventional error diffusion algorithms as it can eliminate directional hysteresis completely and possesses a good blue noise chara...
Yik-Hing Fung, Yuk-Hee Chan
TPDS
2008
120views more  TPDS 2008»
13 years 8 months ago
A New Storage Scheme for Approximate Location Queries in Object-Tracking Sensor Networks
Energy efficiency is one of the most critical issues in the design of wireless sensor networks. Observing that many sensor applications for object tracking can tolerate a certain d...
Jianliang Xu, Xueyan Tang, Wang-Chien Lee