Sciweavers

3146 search results - page 564 / 630
» The use of compiler optimizations for embedded systems softw...
Sort
View
ESAS
2004
Springer
15 years 10 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
SPEECH
2010
154views more  SPEECH 2010»
14 years 11 months ago
Long story short - Global unsupervised models for keyphrase based meeting summarization
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
Korbinian Riedhammer, Benoît Favre, Dilek Ha...
POPL
2008
ACM
16 years 4 months ago
From dirt to shovels: fully automatic tool generation from ad hoc data
An ad hoc data source is any semistructured data source for which useful data analysis and transformation tools are not readily available. Such data must be queried, transformed a...
Kathleen Fisher, David Walker, Kenny Qili Zhu, Pet...
ROBOCUP
2004
Springer
147views Robotics» more  ROBOCUP 2004»
15 years 9 months ago
Learning to Drive and Simulate Autonomous Mobile Robots
We show how to apply learning methods to two robotics problems, namely the optimization of the on-board controller of an omnidirectional robot, and the derivation of a model of the...
Alexander Gloye, Cüneyt Göktekin, Anna E...
RTCSA
2008
IEEE
15 years 11 months ago
Efficient Query Processing for Tracing RFID Tags by Reordering Location Identifiers
This paper addresses the problem of using the Location IDentifier (LID) as the domain value of the index for trajectories of RFID tags and proposes the solution for solving this p...
Sungwoo Ahn, Bonghee Hong