Sciweavers

2015 search results - page 226 / 403
» Hidden Software Capabilities
Sort
View
EH
2005
IEEE
134views Hardware» more  EH 2005»
14 years 3 months ago
A Move Processor for Bio-Inspired Systems
The structure and operation of multi-cellular organisms relies, among other things, on the specialization of the cells’ physical structure to a finite set of specific operatio...
Gianluca Tempesti, Pierre-André Mudry, Ralp...
ESCIENCE
2005
IEEE
14 years 3 months ago
The Supplier Model for Legacy Applications in a Grid
The use of web services as the basis for grid middleware has allowed scientists to wrap legacy applications as services in order to provide their capabilities to grid users. Howev...
Jonathan Giddy, Ian J. Grimstead, Jason Jones
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 3 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
ISCAS
2005
IEEE
130views Hardware» more  ISCAS 2005»
14 years 3 months ago
Spatial error concealment based on directional decision and intra prediction
—The paper presents a novel spatial error concealment algorithm based on directional decision and intra prediction. Unlike previous approaches that simultaneously recover the pix...
Yan Zhao, Dong Tian, M. M. Hannukasela, Moncef Gab...
ARCS
2005
Springer
14 years 3 months ago
A File System for System Programming in Ubiquitous Computing
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task invol...
Christian Decker, Michael Beigl, Albert Krohn