Sciweavers

7429 search results - page 1401 / 1486
» Embedded System Update
Sort
View
EJIS
2010
112views more  EJIS 2010»
15 years 4 months ago
Toward an 'IT Conflict-Resistance Theory': action research during IT pre-implementation
Most empirical research on users' resistance toward Information Technology (IT) has been conducted after implementation of IT in organisations. Little research has been done ...
Regis Meissonier, Emmanuel Houzé
ENTCS
2006
150views more  ENTCS 2006»
15 years 4 months ago
Causality Versus True-Concurrency
Category theory has been successfully employed to structure the confusing setup of models and equivalences for concurrency: Winskel and Nielsen have related the standard models nc...
Sibylle B. Fröschle, Slawomir Lasota
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 4 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
JUCS
2006
112views more  JUCS 2006»
15 years 4 months ago
A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip
Abstract: Advances in technology now make it possible to integrate hundreds of cores (e.g. general or special purpose processors, embedded memories, application specific components...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi
BC
1998
77views more  BC 1998»
15 years 4 months ago
Nonlinear analysis of epileptic activity in rabbit neocortex
Abstract. We report on the nonlinear analysis of electroencephalogram (EEG) recordings in the rabbit visual cortex. Epileptic seizures were induced by local penicillin application ...
J. Sarnthein, Henry D. I. Abarbanel, H. Pockberger
« Prev « First page 1401 / 1486 Last » Next »