Sciweavers

948 search results - page 187 / 190
» Designing technology for community appropriation
Sort
View
EMSOFT
2005
Springer
14 years 26 days ago
A sink-n-hoist framework for leakage power reduction
Power leakage constitutes an increasing fraction of the total power consumption in modern semiconductor technologies. Recent research efforts have tried to integrate architecture...
Yi-Ping You, Chung-Wen Huang, Jenq Kuen Lee
ICCS
2005
Springer
14 years 25 days ago
High-Fidelity Simulation of Large-Scale Structures
Active structures capable of responding to external stimulii represent the emerging frontier in structural design. Robust and real-time sensing, control, and actuation pose fundame...
Christoph Hoffmann, Ahmed H. Sameh, Ananth Grama
CF
2004
ACM
14 years 23 days ago
Modeling service-based multimedia content adaptation in pervasive computing
Pervasive computing applications allow users to access information from anywhere while traveling and using variety of devices. Heterogeneity and limitation of resources involved i...
Girma Berhe, Lionel Brunie, Jean-Marc Pierson
IMC
2004
ACM
14 years 23 days ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
GI
2004
Springer
14 years 21 days ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner