Sciweavers

1207 search results - page 182 / 242
» Towards optimal k-anonymization
Sort
View
ISQED
2008
IEEE
112views Hardware» more  ISQED 2008»
14 years 3 months ago
Robust Analog Design for Automotive Applications by Design Centering with Safe Operating Areas
The effects of random variations during the manufacturing process on devices can be simulated as a variation of transistor parameters. Device degradation, due to temperature or vo...
Udo Sobe, Karl-Heinz Rooch, Andreas Ripp, Michael ...
LCN
2008
IEEE
14 years 3 months ago
Delay constrained placement of mobile data collectors in underwater acoustic sensor networks
—We propose a scheme for routing and placement of mobile data collectors in Underwater Acoustic Sensor Networks (UASNs). The proposed scheme maximizes the lifetime of the network...
Waleed Alsalih, Hossam S. Hassanein, Selim G. Akl
PIMRC
2008
IEEE
14 years 3 months ago
A Distributed IP Mobility Approach for 3G SAE
—Future generations of mobile operator networks, based on an all-IP-based flat architecture and a multitude of different access technologies, require a proper IP-based mobility ...
Mathias Fischer, Frank-Uwe Andersen, Andreas K&oum...
RSP
2008
IEEE
118views Control Systems» more  RSP 2008»
14 years 3 months ago
Functional DIF for Rapid Prototyping
Dataflow formalisms have provided designers of digital signal processing systems with optimizations and guarantees to arrive at quality prototypes quickly. As system complexity in...
William Plishker, Nimish Sane, Mary Kiemb, Kapil A...
SCAM
2008
IEEE
14 years 3 months ago
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software
Aspect-Oriented Programming (AOP) strives to localize the scattered and tangled implementations of crosscutting concerns (CCCs) by allowing developers to declare that certain acti...
Raffi Khatchadourian, Awais Rashid