Sciweavers

1930 search results - page 286 / 386
» Decentralised Control of Complex Systems
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 2 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
140
Voted
CAD
2007
Springer
15 years 2 months ago
Interpolation by geometric algorithm
We present a novel geometric algorithm to construct a smooth surface that interpolates a triangular or a quadrilateral mesh of arbitrary topological type formed by n vertices. Alt...
Takashi Maekawa, Yasunori Matsumoto, Ken Namiki
121
Voted
CONSTRAINTS
2004
129views more  CONSTRAINTS 2004»
15 years 2 months ago
CLPGUI: A Generic Graphical User Interface for Constraint Logic Programming
Abstract. CLPGUI is a generic graphical user interface for visualizing and controlling the execution of constraint logic programs. CLPGUI has been designed to be used in different ...
François Fages, Sylvain Soliman, Rém...
TVLSI
2002
111views more  TVLSI 2002»
15 years 2 months ago
Circular BIST with state skipping
Circular built-in self-test (BIST) is a "test per clock" scheme that offers many advantages compared with conventional BIST approaches in terms of low area overhead, simp...
Nur A. Touba
TRUSTBUS
2010
Springer
15 years 27 days ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen