Sciweavers

759 search results - page 128 / 152
» Verification of a Microprocessor Using Real World Applicatio...
Sort
View
ECR
2007
116views more  ECR 2007»
13 years 11 months ago
Enabling assisted strategic negotiations in actual-world procurement scenarios
In the everyday business world, the sourcing process of multiple goods and services usually involves complex negotiations (via telephone, fax, etc) that include discussion of prod...
Jesús Cerquides, Maite López-S&aacut...
SENSYS
2004
ACM
14 years 4 months ago
Versatile low power media access for wireless sensor networks
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...
Joseph Polastre, Jason L. Hill, David E. Culler
TPDS
2010
159views more  TPDS 2010»
13 years 9 months ago
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks
The circular sensing model has been widely used to estimate performance of sensing applications in existing analysis and simulations. While this model provides valuable high-level...
Joengmin Hwang, Tian He, Yongdae Kim
CCS
2009
ACM
14 years 11 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
PERCOM
2004
ACM
14 years 10 months ago
Augmenting Film and Video Footage with Sensor Data
With the advent of tiny networked devices, Mark Weiser's vision of a world embedded with invisible computers is coming to age. Due to their small size and relative ease of dep...
Norman Makoto Su, Heemin Park, Eric Bostrom, Jeff ...