Sciweavers

1920 search results - page 227 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Music Signal Synthesis using Sinusoid Models and Sliding-Window Esprit
This paper proposes a music signal synthesis scheme that is based on sinusoid modeling and sliding-window ESPRIT. Despite widely used audio coding standards, effectively synthesiz...
Anders Gunnarsson, Irene Gu
ISLPED
2006
ACM
122views Hardware» more  ISLPED 2006»
15 years 10 months ago
Dynamic thermal clock skew compensation using tunable delay buffers
—The thermal gradients existing in high-performance circuits may significantly affect their timing behavior, in particular, by increasing the skew of the clock net and/or alteri...
Ashutosh Chakraborty, Karthik Duraisami, Ashoka Vi...
ICN
2005
Springer
15 years 9 months ago
Information Fusion for Data Dissemination in Self-Organizing Wireless Sensor Networks
Data dissemination is a fundamental task in wireless sensor networks. Because of the radios range limitation and energy consumption constraints, sensor data is commonly disseminate...
Eduardo Freire Nakamura, Carlos Mauricio S. Figuei...
VLDB
2005
ACM
140views Database» more  VLDB 2005»
15 years 9 months ago
Complex Spatio-Temporal Pattern Queries
This paper introduces a novel type of query, what we name Spatio-temporal Pattern Queries (STP). Such a query specifies a spatiotemporal pattern as a sequence of distinct spatial...
Marios Hadjieleftheriou, George Kollios, Petko Bak...
153
Voted
SASN
2003
ACM
15 years 9 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras