


default search action
PACRIM 2017: Victoria, BC, Canada
- IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM 2017, Victoria, BC, Canada, August 21-23, 2017. IEEE 2017, ISBN 978-1-5386-0700-8

- Kamel Alrashedy, Ben Kimmett, T. Aaron Gulliver:

Performance of software-defined networking controllers for different network topologies. 1-4 - Motoki Hasegawa, Munenori Kai:

Hierarchical scheduling method corresponding to multiple macros of task graph. 1-6 - Seyedali Mostafavian, Michael D. Adams

:
A novel edge-preserving mesh-based method for image scaling. 1-6 - Yuna Okayasu, Tatsunori Ozawa, Maitai Dahlan, Hiromitsu Nishimura, Hiroshi Tanaka:

Performance enhancement by combining visual clues to identify sign language motions. 1-4 - Nathan Vandenberg, Maycira Costa, Yvonne Coady, Tolu Agbaje:

PySciDON: A python scientific framework for development of ocean network applications. 1-6 - Shuai Xing, Hao Zhang, Xiaolin Liang, T. Aaron Gulliver:

A 60 GHz impulse radio positioning algorithm based on a BP neural network. 1-5 - Salman Almishari, Nor Ababtein, Prajna Dash, Kshirasagar Naik:

An energy efficient real-time vehicle tracking system. 1-6 - Shusuke Okamoto, Masaki Kohana:

Running a MPI program on web browsers. 1-6 - Hayato Tsukiji, Kosuke Takano:

Knowledge extraction from creators of presentation slides on a slide sharing service. 1-5 - Hikari Ohura, Hiroko Midorikawa, Kenji Kitagawa, Munenori Kai:

Design and evaluation of page-swap protocols for a remote memory paging system. 1-8 - Michael D. Adams

:
Aristotle: A flexible open-source software toolkit for semi-automated marking of programming assignments. 1-6 - Xiaolin Xia, Hao Zhang, Tingting Lu, T. Aaron Gulliver:

Design of a beidou satellite radome for deep-sea buoys. 1-5 - Tomoki Tajimi, Anju Hirota, Ryota Shioya, Masahiro Goshima, Tomoaki Tsumura:

Initial study of a phase-aware scheduling for hardware transactional memory. 1-6 - M. Youssef El-Ganiny, Hussein M. ElAttar, Mohamed A. Aboul-Dahab, Talaat A. Elgarf:

Improved coding gain of clipped OFDM signal using avalanche effect of AES block cipher. 1-6 - Han Xiao, Hao Zhang, Zengfeng Wang, T. Aaron Gulliver:

An RSSI based DV-hop algorithm for wireless sensor networks. 1-6 - Fayez Gebali, Ali Alzahrani

:
Data-flow implementation of concurrent asynchronous systems. 1-5 - Ahmed Youssef

, Peter F. Driessen, Fayez Gebali, Belaid Moa, Stephen T. Harrison:
Enhancement of time compression overlap-add using multirate downsample upsample shift add algorithm. 1-5 - Conghui Cao, Hao Zhang, Tingting Lu, T. Aaron Gulliver:

An improved cooperative jamming strategy for PHY security in a multi-hop communications system. 1-4 - Robert O'Dywer, Stephen W. Neville:

Assessing QoS consistency in cloud-based software-as-a-service deployments. 1-6 - Tomoki Yoshihisa:

Data piece elimination technique for interruption time reduction on hybrid broadcasting environments. 1-6 - S. Navid Shahrouzi

, Darshika G. Perera:
An efficient FPGA-based memory architecture for compute-intensive applications on embedded devices. 1-8 - Dev Bhattacharya, Kenneth B. Kent

, Eric Aubanel, Daniel Heidinga, Peter Shipton, Aleksandar Micic:
Improving the performance of JVM startup using the shared class cache. 1-6 - Mehrdad Nourai, Haim Levkowitz:

Securing email for the average users via a new architecture. 1-6 - Tomi Wijaya, Wahyu Caesarendra, Bobby K. Pappachan, Tegoeh Tjahjowidodo, Arthur Wee, Muhammad Izzat Roslan:

Robot control and decision making through real-time sensors monitoring and analysis for industry 4.0 implementation on aerospace component manufacturing. 1-6 - Changxu Shan, Le Yang

, Liu Yang
, Xi Li, Wei Li:
TDOA-FDOA source geolocation using moving horizon estimation with satellite location errors. 1-6 - Ahmed Youssef

, Peter F. Driessen, Fayez Gebali, Belaid Moa:
Performance evaluation of time compression overlap-add radar systems based on order-statistics CFAR under convolution noise jamming. 1-6 - Tianming Wei, Madhav Malhotra, Bing Gao, Tomas Bednar, Derek Jacoby, Yvonne Coady:

No such thing as a "free launch"? Systematic benchmarking of containers. 1-6 - Hiroko Midorikawa, Hideyuki Tan:

A highly efficient I/O-based out-of-core stencil algorithm with globally optimized temporal blocking. 1-6 - Yang Zhang, Zhi Qi, Xiaoxi Wu, Wenjie Fu:

A novel evaluation method for superscalar out-of-order ARM microprocessors targeting android applications. 1-6 - Naeem Ayoub

, Muhammad Asad, Muhammad Aslam, Zhenguo Gao, Ehsan Ullah Munir, Rachida Tobji:
MAHEE: Multi-hop advance heterogeneity-aware energy efficient path planning algorithm for wireless sensor networks. 1-6 - Yousef S. Ettomi Ali, Vijay Parsa, Philip C. Doyle, Soulaimane Berkane

:
Disordered speech quality estimation using linear prediction. 1-5 - Wu-Sheng Lu:

Handwritten digits recognition using PCA of histogram of oriented gradient. 1-5 - Fengying Sun, Kecheng Ji, Ming Ling, Longxing Shi:

A trace-driven analytical model with less profiling overhead for DRAM access latencies. 1-6 - Rachel Ralph, Derek Jacoby, Yvonne Coady, Deepak Balachandar, Emily Burt, Nathan Hnguyen, JongJik Kim, Krisha Maclang, Steven Wong, Larry Bafia:

Metrics for evaluation of educational experiences: Will virtual reality have impact? 1-6 - Farook Sattar

, Colter McQuay, Peter F. Driessen:
Marine mammal sound anomaly and quality detection using multitaper spectrogram and hydrophone big data. 1-6 - Colter McQuay, Farook Sattar

, Peter F. Driessen:
Deep learning for hydrophone big data. 1-6 - Huaifeng Zhang, Hao Zhang, Xing Liu, T. Aaron Gulliver:

A new electromagnetic jamming system for unmanned aerial vehicles. 1-5 - Mostafa A. Al-Dosuky, Mona Safar, M. Watheq El-Kharashi:

A kernel-based solution for overload in mixed criticality multicore systems. 1-6 - Zahra Nikdel, Bing Gao, Stephen W. Neville:

DockerSim: Full-stack simulation of container-based Software-as-a-Service (SaaS) cloud deployments and environments. 1-6 - ThiOanh Bui, Pingping Xu:

Energy considerations for node localization. 1-5 - Lior Bragilevsky

, Ivan V. Bajic
:
Deep learning for Amazon satellite image analysis. 1-5 - Qin Wang, Kecheng Ji, Ming Ling, Longxing Shi:

A mechanistic model of memory level parallelism fed with cache miss rates. 1-6 - Takafumi Nakanishi

, Keisuke Tamaru:
An impression estimation and visualization method for TV commercials. 1-6 - Shinya Kato, Kenichiro Hida, Shin-ichi Kuribayashi:

Enhanced congestion control method for servers and network lines with DPI technology. 1-6 - Jiang Lin, Ivan V. Bajic

:
Automatic image cropping based on bottom-up saliency and top-down semantics. 1-5 - Willian Tadeu Poloni, Ricardo Becker, Ricardo Balbinot

:
Remote control of low cost devices using SNMP agents. 1-6 - Ryota Matsufuji, Dirceu Cavendish, Kazumi Kumazoe, Daiki Nobayashi, Takeshi Ikenaga

:
Multipath TCP path schedulers for streaming video. 1-6 - Carlos Eduardo Orihuela Vargas, Luiz da Silva Mello, R. Carlos Rodriguez:

Measurements of construction materials penetration losses at frequencies from 26.5 GHz to 40 GHz. 1-4 - Alaa Alakari, Kin Fun Li, Fayez Gebali:

Complex event processing enrichment: Motivations and challenges. 1-7 - Ramprasad Raghavan, Darshika G. Perera:

A fast and scalable FPGA-based parallel processing architecture for K-means clustering for big data analysis. 1-8 - Azden Bierbrauer, Konstantin Nasartschuk, Adam Richard, Kenneth B. Kent

, Peter Shipton:
User controlled object sharing between Java VM instances. 1-6 - Yanling Xu, Xiaohu Guo, Dayao Wei:

Hardware-friendly method for rate-distortion optimization of HEVC intra coding. 1-4 - Md Asif Nashiry, Jacqueline E. Rice:

A reversible majority voter circuit and applications. 1-6 - Muhammad Aslam, Fan Wang, Zefeng Lv, Muhammad Asad, Samra Zafar, Ehsan Ullah Munir, Xiaopeng Hu:

Energy Efficient Cubical layered Path Planning Algorithm (EECPPA) for acoustic UWSNs. 1-6 - Tianming Wei, Yvonne Coady, Josh MacDonald, Kellogg S. Booth, Jon Salter, Cynthia L. Girling:

Dumb pipes for smart systems: How tomorrow's applications can salvage yesterday's plumbing. 1-5 - Badr Eddine El Marzouki, Michael D. Adams

:
An improved incremental/decremental delaunay mesh-generation strategy for image representation. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














