Sciweavers

2162 search results - page 38 / 433
» E-Crime Investigative Technologies
Sort
View
SIGCPR
2006
ACM
82views Hardware» more  SIGCPR 2006»
14 years 2 months ago
Information technology architects: approaching the longer view
All Information Technology (IT) systems have architecture and these architectures are developed by people, frequently called IT architects. These people vary in their capabilities...
Keith Frampton, James A. Thom, Jennie Carroll, Bru...
APSEC
2002
IEEE
14 years 1 months ago
Evaluating the Scalability of Enterprise JavaBeans Technology
One of the major problems in building large-scale distributed systems is to anticipate the performance of the eventual solution before it has been built. This problem is especiall...
Yan (Jenny) Liu, Ian Gorton, Anna Liu, Shiping Che...
ISLPED
2009
ACM
108views Hardware» more  ISLPED 2009»
14 years 1 months ago
Technology flavor selection and adaptive techniques for timing-constrained 45nm subthreshold circuits
We investigate techniques to design 45nm minimum-energy subthreshold CMOS circuits under timing constraints, considering the practical case of an 8-bit multiplier. We first show ...
David Bol, Denis Flandre, Jean-Didier Legat
LREC
2010
138views Education» more  LREC 2010»
13 years 10 months ago
Human Language Technology and Communicative Disabilities: Requirements and Possibilities for the Future
For some years now, the Nederlandse Taalunie (Dutch Language Union) has been active in promoting the development of human language technology (HLT) applications for users of Dutch...
Marina B. Ruiter, Toni C. M. Rietveld, Catia Cucch...
TSMC
2008
110views more  TSMC 2008»
13 years 8 months ago
Navigation Technologies for Autonomous Underwater Vehicles
With recent advances in battery capacity and the development of hydrogen fuel cells, autonomous underwater vehicles (AUVs) are being used to undertake longer missions that were pre...
L. Stutters, Honghai Liu, C. Tiltman, David J. Bro...