Sciweavers

1799 search results - page 158 / 360
» Design considerations for MRAM
Sort
View
ECWEB
2005
Springer
149views ECommerce» more  ECWEB 2005»
15 years 10 months ago
Architecture of a Semantic XPath Processor. Application to Digital Rights Management
This work describes a novel strategy for designing an XPath processor that acts over an RDF mapping of XML. We use a modelmapping approach to represent instances of XML and XML Sch...
Rubén Tous, Roberto García, Eva Rodr...
EUSAI
2004
Springer
15 years 10 months ago
The PLANTS System: Enabling Mixed Societies of Communicating Plants and Artefacts
In this paper we discuss research work that enables the development of mixed societies of communicating plants and artefacts. PLANTS is an EUfunded Research and Development project...
Christos Goumopoulos, Eleni Christopoulou, Nikos D...
IFIP
2004
Springer
15 years 10 months ago
Multicode Multirate Compact Assignment of OVSF Codes for QoS Differentiated Terminals
—Orthogonal variable spreading factor (OVSF) codes are used in both universal terrestrial radio access–frequency division duplex (UTRA-FDD) and time division duplex (UTRA-TDD) ...
Yang Yang, Tak-Shing Peter Yum
ROBOCUP
2004
Springer
127views Robotics» more  ROBOCUP 2004»
15 years 10 months ago
A Novel Search Strategy for Autonomous Search and Rescue Robots
In this work, a novel search strategy for autonomous search and rescue robots, that is highly suitable for the environments when the aid of human rescuers or search dogs is complet...
Sanem Sariel, H. Levent Akin
UCS
2004
Springer
15 years 10 months ago
Dependable Coding of Fiducial Tags
Fiducial tags can be recognised successfully and decoded by computer vision systems in order to produce location information. We term a system dependable if its observable results ...
Andrew C. Rice, Christopher B. Cain, John K. Fawce...