Search Results

You are looking at 1 - 10 of 11 items for :

  • Information Technology x
Clear All
Open access

Tomasz Garbolino

-Wen Liu, Jr-Yang Huang, “IEEE 1500 Compatible Interconnect Test with Maximal Test Concurrency”, in Procs. 18th IEEE Asian Test Symposium - ATS 2009, 2009, Taichung, Taiwan, pp. 269-274. [20] P. Magarshack, P.G. Paulin, “System-on-Chip beyond the Nanometer Wall”, in Procs. 40th IEEE/ACM Design Automation Conference - DAC’03, Anaheim, USA, 2003, pp. 419-424. [21] P. Nordholz, D. Treytnar, J. Otterstedt, H. Grabinski, D. Niggemeyer, T.W. Williams, “Signal Integrity Problems in Deep Submicron arising from Interconnects between Cores”, in

Open access

Paweł Kosz

. [20] Cobham Antenna Systems, “VHF/UHF Whip Antenna – OA1-0.03-0.50V/2013”, Technical Data Sheet , 2013. [21] Rohde & Schwarz, “Active Directional Antenna – HE300”, Technical Data Sheet , 2014. [22] Anritsu, “Spectrum Master – User Guide – MS2721B”, Technical Data Sheet , 2008. [23] S. J. Ambroziak, “Measuring research on radio wave propagation – normative requirements (in Polish)”, Telecommunication Review and Telecommunication News , vol. 2-3, pp. 84-89, 2010. [24] ITU-R P.522-5 “Calculation of Free-Space Attenuation”, 1994. [25] R

Open access

Michał Kucharzak, Dawid Zydek and Iwona Poźniak-Koszałka

.08.025. [10] Y. Chu, S. G. Rao, and H. Zhang, “A case for end system multicast,” in in Proceedings of ACM Sigmetrics, 2000, pp. 1-12. [11] Y. Cui, Y. Xue, and K. Nahrstedt, “Optimal resource allocation in overlay multicast,” in in Proc. of 11th International Conference on Network Protocols, ICNP, 2003. [12] M. Kucharzak and K. Walkowiak, “A mixed integer formulation for multicast flow assignment in multilayer networks,” in Proc. Fifth Int Broadband and Biomedical Communications (IB2Com) Conf, 2010, pp. 1-4. [13] --, “Maximum

Open access

Arkadiusz Bukowiec and Marian Adamski

: Oxford, International Federation of Automatic Control, 1999, pp. 519-524. [3] D. Drusinsky and D. Harel, “Using statecharts for hardware description and synthesis,” IEEE Transactions on Computer-Aided Design, vol. 8, no. 7, pp. 798-807, 1989. [4] G. Łabiak, “From UML statecharts to FPGA - the HiCoS approach,” in Proceedings of the Forum on Specification & Design Languages FDL’03. Frankfurt, Germany: ECSI, 2003, pp. 354-363. [5] M. Doligalski, Behavioral Specification Diversification of Reconfigurable Logic Controllers

Open access

Marek Bury, Yevhen Yashchyshyn and Jozef Modelski

. S. Davis, B. Van Veen, S. Hagness, and F. Kelcz, "Breast tumor characterization based on ultrawideband microwave backscatter," IEEE Transactions on, Biomedical Engineering , vol. 55, no. 1, pp. 237-246, jan. 2008. S. G. Glisic, Advanced Wireless Communications, Second Edition (Second Edition). John Wiley & Sons, Chichester 2007. S. Hantscher, A. Reisenzahn, and C. Diskus, "Through-wall imaging with a 3-d uwb sar algorithm," IEEE Signal Processing Letters , vol. 15, pp. 269-272, 2008

Open access

Grzegorz J. Blinowski

, University of Oxford, "Visible Light Communication: Tutorial," 2008, http://www.ieee802.org/802_tutorials/2008-03/15-08-0114-02-0000-VLC_Tutorial_MCO_Samsung-VLCC-Oxford_2008-03-17.pdf [7] M. B. Rahaim, A.M. Vegni and T. D. Little, "A hybrid radio frequency and broadcast visible light communication system," in Proc. IEEE Global Communications Conference (GLOBECOM) Workshops, 2011, pp. 792-796. [8] L.B. Chen, et al. "Development of a dual-mode visible light communications wireless digital conference system," In Consumer Electronics (ISCE 2014

Open access

Waldemar Graniszewski and Adam Arciszewski

R eferences [1] G. J. Popek and R. P. Goldberg, “Formal requirements for virtualizable third generation architectures,” Commun. ACM , vol. 17, no. 7, pp. 412–421, Jul. 1974. [Online]. Available: http://doi.acm.org/10.1145/361011.361073 [2] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of virtualization,” SIGOPS Oper. Syst. Rev. , vol. 37, no. 5, pp. 164–177, Oct. 2003. [Online]. Available: http://doi.acm.org/10.1145/1165389.945462 [3] Oracle. Virtualbox. [Online

Open access

Pablo Muñoz, Isabel de la Bandera, Fernando Ruiz, Salvador Luna-Ramírez, Raquel Barco, Matías Toril, Pedro Lázaro and Jaime Rodríguez

Conference (VTC 2001) , pp. 2094-2104, 2001. I. Khider, A. Saad, and W. Furong, "Study on Indoor and Outdoor Environment for Mobile Ad Hoc Network Supported with Base Stations," Wireless Communications, Networking and Mobile Computing (WiCom) , 2007. ETSI TR 101 112 v.3.2.0, Selection procedures for the choice of radio transmission technologies of the UMTS (UMTS 30.03 version 3.1.0), ETSI April 1998. A. Lobinger, S. Stefanski, and T. Jansen, "Load Balancing in Down-link LTE Self

Open access

Radosław O. Schoeneich and Rafał Surgiewicz

. BinBin and C. M. Choon, Mobicent: a credit-based incentive system for disruption tolerant network, in Proc. IEEE INFOCOM10, Mar. 2010. [24] Q. Li, S. Zhu, and G. Cao, Routing in socially selfish delay tolerant networks, in INFOCOM10: Proc. 29th IEEE International conference on Computer Communications, Mar. 2010, doi: 10.1109/INFCOM.2010.5462138 [25] Y. Zhu, B. Xu, X. Shi, A Survey of Social-Based Routing in Delay Tolerant Networks: Positive and Negative Social Effects., IEEE Communications Surveys and Tutorials 15 (1) 2013, 387-401, doi: 10.1109/SURV.2012

Open access

Jacek Naruniec

of the Second European Conference on Computer Vision , 1992, pp. 92-96. N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 1st ed. Cambridge University Press, March 2000. D. Cristinacce and T. Cootes, "Facial feature detection using adaboost with shape constraints," in BMVC03 , 2003. G. Donato, M. S. Bartlett, J. C. Hager, P. Ekman, and T. J. Sejnowski, "Classifying facial actions," IEEE Transactions on Pattern