Sciweavers

24188 search results - page 4742 / 4838
» Computing on Encrypted Data
Sort
View
ICPPW
2002
IEEE
15 years 9 months ago
Hebbian Algorithms for a Digital Library Recommendation System
generally meta-data, so that documents on any specific subject can be transparently retrieved. While quality control can in principle still rely on the traditional methods of peer-...
Francis Heylighen, Johan Bollen
ICRA
2002
IEEE
136views Robotics» more  ICRA 2002»
15 years 9 months ago
Motion Dynamics of a Rover with Slip-Based Traction Model
This paper investigates kinetic behavior of a planetary rover with attention to tire-soil traction mechanics and articulated body dynamics, and thereby study the control when the ...
Kazuya Yoshida, Hiroshida Hamano
INFOCOM
2002
IEEE
15 years 9 months ago
QoS and Fairness Constrained Convex Optimization of Resource Allocation for Wireless Cellular and Ad Hoc Networks
— For wireless cellular and ad hoc networks with QoS constraints, we propose a suite of problem formulations that allocate network resources to optimize SIR, maximize throughput ...
David Julian, Mung Chiang, Daniel O'Neill, Stephen...
ISVLSI
2002
IEEE
109views VLSI» more  ISVLSI 2002»
15 years 9 months ago
A Network on Chip Architecture and Design Methodology
We propose a packet switched platform for single chip systems which scales well to an arbitrary number of processor like resources. The platform, which we call Network-on-Chip (NO...
Shashi Kumar, Axel Jantsch, Mikael Millberg, Johnn...
MICRO
2002
IEEE
143views Hardware» more  MICRO 2002»
15 years 9 months ago
Effective instruction scheduling techniques for an interleaved cache clustered VLIW processor
Clustering is a common technique to overcome the wire delay problem incurred by the evolution of technology. Fully-distributed architectures, where the register file, the functio...
Enric Gibert, F. Jesús Sánchez, Anto...
« Prev « First page 4742 / 4838 Last » Next »