Sciweavers

3865 search results - page 770 / 773
» Active memory operations
Sort
View
ISF
2010
273views more  ISF 2010»
13 years 7 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
IS
2011
13 years 4 months ago
Optimized query routing trees for wireless sensor networks
In order to process continuous queries over Wireless Sensor Networks (WSNs), sensors are typically organized in a Query Routing Tree (denoted as T) that provides each sensor with ...
Panayiotis Andreou, Demetrios Zeinalipour-Yazti, A...
TC
2010
13 years 4 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
MICROMACHINES
2011
13 years 4 months ago
Modeling Self-Assembly Across Scales: The Unifying Perspective of Smart Minimal Particles
: A wealth of current research in microengineering aims at fabricating devices of increasing complexity, notably by (self-)assembling elementary components into heterogeneous funct...
Massimo Mastrangeli, Grégory Mermoud, Alche...
MICRO
2011
IEEE
193views Hardware» more  MICRO 2011»
13 years 1 months ago
Voltage Noise in Production Processors
Abstract—Parameter variations have become a dominant challenge in microprocessor design. Voltage variation is especially daunting because it happens so rapidly. We measure and ch...
Vijay Janapa Reddi, Svilen Kanev, Wonyoung Kim, Si...