Sciweavers

1920 search results - page 15 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
EICS
2009
ACM
14 years 3 months ago
A toolkit for peer-to-peer distributed user interfaces: concepts, implementation, and applications
In this paper we present a software toolkit for deploying peer-topeer distributed graphical user interfaces across four dimensions: multiple displays, multiple platforms, multiple...
Jérémie Melchior, Donatien Grolaux, ...
CIKM
2009
Springer
14 years 1 months ago
Scalable continuous range monitoring of moving objects in symbolic indoor space
Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., s...
Bin Yang 0002, Hua Lu, Christian S. Jensen
JSAC
2008
94views more  JSAC 2008»
13 years 8 months ago
Soft-output sphere decoding: algorithms and VLSI implementation
Multiple-input multiple-output (MIMO) detection algorithms providing soft information for a subsequent channel decoder pose significant implementation challenges due to their high ...
Christoph Studer, Andreas Burg, Helmut Bölcsk...
VECPAR
2000
Springer
14 years 3 hour ago
A Parallel Implementation of an Interior-Point Algorithm for Multicommodity Network Flows
A parallel implementation of the specialized interior-point algorithm for multicommodity network flows introduced in [5] is presented. In this algorithm, the positive definite syst...
Jordi Castro, Antonio Frangioni
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
14 years 2 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen