Sciweavers

2945 search results - page 554 / 589
» Designing and Implementing Malicious Hardware
Sort
View
CASES
2003
ACM
15 years 9 months ago
A low-power accelerator for the SPHINX 3 speech recognition system
Accurate real-time speech recognition is not currently possible in the mobile embedded space where the need for natural voice interfaces is clearly important. The continuous natur...
Binu K. Mathew, Al Davis, Zhen Fang
SIGUCCS
2003
ACM
15 years 9 months ago
How to recruit, motivate and retain effective student workers?
Louisiana State University’s Biomedical Research Center is on a tight state funded budget, as are most state educational institutions. Resources are constantly being exhausted a...
Claire C. Lassalle, Robyn C. Richard
CLUSTER
2002
IEEE
15 years 9 months ago
Scalable Resource Management in High Performance Computers
Clusters of workstations have emerged as an important platform for building cost-effective, scalable, and highlyavailable computers. Although many hardware solutions are available...
Eitan Frachtenberg, Fabrizio Petrini, Juan Fern&aa...
ISCAS
2002
IEEE
153views Hardware» more  ISCAS 2002»
15 years 9 months ago
Biological learning modeled in an adaptive floating-gate system
We have implemented an aspect of learning and memory in the nervous system using analog electronics. Using a simple synaptic circuit we realize networks with Hebbian type adaptati...
Christal Gordon, Paul E. Hasler
GPCE
2009
Springer
15 years 8 months ago
A generative programming approach to developing pervasive computing systems
Developing pervasive computing applications is a difficult task because it requires to deal with a wide range of issues: heterogeneous devices, entity distribution, entity coordi...
Damien Cassou, Benjamin Bertran, Nicolas Loriant, ...