Sciweavers

209 search results - page 38 / 42
» Exploiting Information Relationships for Access Control
Sort
View
CHI
2009
ACM
14 years 11 months ago
Designable visual markers
Visual markers are graphic symbols designed to be easily recognised by machines. They are traditionally used to track goods, but there is increasing interest in their application ...
Enrico Costanza, Jeffrey Huang
BMCBI
2007
108views more  BMCBI 2007»
13 years 10 months ago
Design and implementation of a generalized laboratory data model
Background: Investigators in the biological sciences continue to exploit laboratory automation methods and have dramatically increased the rates at which they can generate data. I...
Michael C. Wendl, Scott Smith, Craig S. Pohl, Davi...
INFOCOM
2006
IEEE
14 years 4 months ago
A Framework for Distributed Spatio-Temporal Communications in Mobile Ad Hoc Networks
— Space-time communications can help combat fading and hence can significantly increase the capacity of ad hoc networks. Cooperative diversity or virtual antenna arrays facilita...
Gentian Jakllari, Srikanth V. Krishnamurthy, Micha...
EURONGI
2005
Springer
14 years 4 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
ISCA
2002
IEEE
104views Hardware» more  ISCA 2002»
13 years 10 months ago
Speculative Dynamic Vectorization
Traditional vector architectures have shown to be very effective for regular codes where the compiler can detect data-level parallelism. However, this SIMD parallelism is also pre...
Alex Pajuelo, Antonio González, Mateo Valer...