Sciweavers

1501 search results - page 221 / 301
» Towards Integration of Modeling Methods for Cyber-Physical S...
Sort
View
WCNC
2010
IEEE
15 years 8 months ago
MAC Performance Analysis for Vehicle-to-Infrastructure Communication
—The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e....
Tom H. Luan, Xinhua Ling, Xuemin Shen
DAS
2008
Springer
15 years 6 months ago
Handling of Surface Modifications for Robust Image Based Mail Piece Comparison
Image based mail piece identification is a new technology for optimizing the postal sorting process. Exploiting the mail piece surface uniqueness, characteristic features are used...
Katja Worm, Beate Meffert
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
ICMCS
2008
IEEE
123views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Scalable data hiding for online textured 3D terrain visualization
A method for 3D scalable visualization, in a client/server environment is presented. The main idea presented in this paper is to increase the quality of 3D visualization for low b...
Khizar Hayat, William Puech, Gilles Gesquiere
FMCAD
2006
Springer
15 years 8 months ago
Design for Verification of the PCI-X Bus
The importance of re-usable Intellectual Properties (IPs) cores is increasing due to the growing complexity of today's system-on-chip and the need for rapid prototyping. In th...
Haja Moinudeen, Ali Habibi, Sofiène Tahar