Sciweavers

1469 search results - page 278 / 294
» Design and Implementation of Software Objects in Hardware
Sort
View
SENSYS
2009
ACM
14 years 2 months ago
Canopy closure estimates with GreenOrbs: sustainable sensing in the forest
Motivated by the needs of precise forest inventory and realtime surveillance for ecosystem management, in this paper we present GreenOrbs [1], a wireless sensor network system and...
Lufeng Mo, Yuan He, Yunhao Liu, Jizhong Zhao, Shao...
VISUALIZATION
2003
IEEE
14 years 1 months ago
LightKit: A lighting system for effective visualization
LightKit is a system for lighting three-dimensional synthetic scenes. LightKit simplifies the task of producing visually pleasing, easily interpretable images for visualization w...
Michael Halle, Jeanette C. Meng
DRM
2006
Springer
13 years 11 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...
FUIN
2008
119views more  FUIN 2008»
13 years 8 months ago
Modeling Communication with Synchronized Environments
A deterministic behavior of systems composed of several modules is a desirable design goal. Assembling a complex system from components requires also a high degree of re-usability....
Tiberiu Seceleanu, Axel Jantsch
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 4 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...