Sciweavers

6770 search results - page 193 / 1354
» How GPUs Work
Sort
View
TMC
2008
83views more  TMC 2008»
15 years 2 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
JOT
2007
121views more  JOT 2007»
15 years 2 months ago
Aspect Oriented Programming in .NET. Based on Attributes
Aspect Oriented Programming proposes an approach to increase code functionality with aspects that are not part of the main code functionality. The current work shows how can be do...
Miguel Katrib Mora, Yamil Hernández Sa&aacu...
110
Voted
AC
2002
Springer
15 years 2 months ago
Software Fault Prevention by Language Choice: Why C is Not My Favorite Language
How much does the choice of a programming language influence the prevalence of bugs in the resulting code? It seems obvious that at the level at which individuals write new progra...
Richard J. Fateman
115
Voted
APIN
2002
80views more  APIN 2002»
15 years 2 months ago
Searching a Scalable Approach to Cerebellar Based Control
Decades of research into the structure and function of the cerebellum have led to a clear understanding of many of its cells, as well as how learning might take place. Furthermore...
Jan Peters, P. Patrick van der Smagt
118
Voted
CE
2007
106views more  CE 2007»
15 years 2 months ago
The need for virtual information managers in education
In this paper, the authors analyse how educational institutions behave in relation with the contents available through the Web. They also reflect on the features of the currently...
Xavier Jaén, Xavier Bohigas, Montse Novell