Sciweavers

2695 search results - page 461 / 539
» A Visual Approach to Validating System Level Designs
Sort
View
MOBILITY
2009
ACM
15 years 7 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
139
Voted
ATAL
2006
Springer
15 years 6 months ago
Agent-community based peer-to-peer information retrieval: an evaluation
The Agent-Community-based Peer-to-Peer Information Retrieval (ACP2P) method uses agent communities to manage and look up information of interest to users. An agent works as a dele...
Tsunenori Mine, Akihiro Kogo, Makoto Amamiya
131
Voted
WSCG
2004
120views more  WSCG 2004»
15 years 3 months ago
Voxelization of Solids Using Simplicial Coverings
Rasterization of polygons in 2D is a well known problem, existing several optimal solutions to solve it. The extension of this problem to 3D is more difficult and most existing so...
Antonio J. Rueda Ruiz, Rafael Jesús Segura,...
139
Voted
ISLPED
2010
ACM
153views Hardware» more  ISLPED 2010»
15 years 2 months ago
Leakage minimization using self sensing and thermal management
We have developed a system architecture, measuring and modeling techniques, and algorithms for on-line power and energy optimization and thermal management. The starting point for...
Alireza Vahdatpour, Miodrag Potkonjak
JCP
2008
142views more  JCP 2008»
15 years 2 months ago
QoS Aware Query Processing Algorithm for Wireless Sensor Networks
In sensor networks, continuous query is commonly used for collecting periodical data from the objects under monitoring. This sort of queries needs to be carefully designed, in orde...
Jun-Zhao Sun