Sciweavers

570 search results - page 43 / 114
» When does Co-training Work in Real Data
Sort
View
VLSI
2005
Springer
15 years 9 months ago
Modeling the Traffic Effect for the Application Cores Mapping Problem onto NoCs
This work addresses the problem of application mapping in networks-on-chip (NoCs) having as goal to minimize the total dynamic energy consumption of a complex system-on-a-chip (So...
César A. M. Marcon, José Carlos S. P...
HASE
2008
IEEE
15 years 4 months ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
ICW
2005
IEEE
209views Communications» more  ICW 2005»
15 years 9 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
CVRMED
1995
Springer
15 years 7 months ago
A New Framework for Fusing Stereo Images with Volumetric Medical Images
Abstract. Some medical interventions require knowing the correspondence between an MRI/CT image and the actual position of the patient. Examples are in neurosurgery or radiotherapy...
Fabienne Betting, Jacques Feldmar, Nicholas Ayache...
ESAS
2006
Springer
15 years 7 months ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...