Sciweavers

5829 search results - page 1108 / 1166
» The Practice of Cluster Analysis
Sort
View
SAINT
2007
IEEE
14 years 3 months ago
A Multi-Carrier UHF Passive RFID System
—The “Gen2” specification for UHF passive RFID systems released by EPCglobal has become an intense research interest. A Gen2 tag derives its power from the RF wave emitted by...
Hsin-Chin Liu, Yung-Ting Chen, Wen-Shin Tzeng
SASO
2007
IEEE
14 years 3 months ago
Novel Mathematics-Inspired Algorithms for Self-Adaptive Peer-to-Peer Computing
This paper describes, and evaluates benefits of, a design methodology to translate certain mathematical models into the design of novel, self-adaptive, peer-to-peer (p2p) distrib...
Steven Y. Ko, Indranil Gupta, Yookyung Jo
CCS
2007
ACM
14 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CIKM
2007
Springer
14 years 3 months ago
Query expansion using probabilistic local feedback with application to multimedia retrieval
As one of the most effective query expansion approaches, local feedback is able to automatically discover new query terms and improve retrieval accuracy for different retrieval ...
Rong Yan, Alexander G. Hauptmann
EMSOFT
2007
Springer
14 years 3 months ago
Methods for multi-dimensional robustness optimization in complex embedded systems
Design space exploration of embedded systems typically focuses on classical design goals such as cost, timing, buffer sizes, and power consumption. Robustness criteria, i.e. sensi...
Arne Hamann, Razvan Racu, Rolf Ernst
« Prev « First page 1108 / 1166 Last » Next »