Sciweavers

3016 search results - page 593 / 604
» Disappearing mobile devices
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 1 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
INTETAIN
2005
Springer
14 years 1 months ago
COMPASS2008: The Smart Dining Service
The Compass20083 project is a sino-german cooperation, aiming at integrating advanced information technologies to create a hightech information system that helps visitors to access...
Ilhan Aslan, Feiyu Xu, Jörg Steffen, Hans Usz...
SEMWEB
2005
Springer
14 years 1 months ago
RelExt: A Tool for Relation Extraction from Text in Ontology Extension
Abstract. Domain ontologies very rarely model verbs as relations holding between concepts. However, the role of the verb as a central connecting element between concepts is undenia...
Alexander Schutz, Paul Buitelaar
ISPD
2004
ACM
146views Hardware» more  ISPD 2004»
14 years 1 months ago
Power-aware clock tree planning
Modern processors and SoCs require the adoption of poweroriented design styles, due to the implications that power consumption may have on reliability, cost and manufacturability ...
Monica Donno, Enrico Macii, Luca Mazzoni