Sciweavers

43190 search results - page 8623 / 8638
» Can Development Be Designed
Sort
View
HOTI
2011
IEEE
12 years 9 months ago
iWISE: Inter-router Wireless Scalable Express Channels for Network-on-Chips (NoCs) Architecture
Abstract—Network-on-Chips (NoCs) paradigm is fast becoming a defacto standard for designing communication infrastructure for multicores with the dual goals of reducing power cons...
Dominic DiTomaso, Avinash Kodi, Savas Kaya, David ...
HUC
2011
Springer
12 years 9 months ago
Sundroid: solar radiation awareness with smartphones
While the sun is important for our health, overexposure to sunlight carries significant health risks ranging from sunburn to skin cancer. Although people know about these risks, ...
Thomas Fahrni, Michael Kuhn 0002, Philipp Sommer, ...
HUC
2011
Springer
12 years 9 months ago
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share
As ubiquitous computing becomes increasingly mobile and social, personal information sharing will likely increase in frequency, the variety of friends to share with, and range of ...
Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cra...
IAAI
2011
12 years 9 months ago
NewsFinder: Automating an Artificial Intelligence News Service
NewsFinder automates the steps involved in finding, selecting and publishing news stories that meet subjective judgments of relevance and interest to the Artificial Intelligence c...
Liang Dong, Reid G. Smith, Bruce G. Buchanan
IACR
2011
106views more  IACR 2011»
12 years 9 months ago
Hash Functions Based on Three Permutations: A Generic Security Analysis
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three permutation executions and on XOR-operators, and analyze its collision and preima...
Bart Mennink, Bart Preneel
« Prev « First page 8623 / 8638 Last » Next »