Sciweavers

46 search results - page 7 / 10
» Identity management: multiple presentations of self in faceb...
Sort
View
GLVLSI
2003
IEEE
132views VLSI» more  GLVLSI 2003»
14 years 23 days ago
A highly regular multi-phase reseeding technique for scan-based BIST
In this paper a novel reseeding architecture for scan-based BIST, which uses an LFSR as TPG, is proposed. Multiple cells of the LFSR are utilized as sources for feeding the scan c...
Emmanouil Kalligeros, Xrysovalantis Kavousianos, D...
AGENTS
1997
Springer
13 years 11 months ago
Designing Behaviors for Information Agents
To facilitate the rapid development and open system interoperability of autonomous agents we need to carefully specify and effectively implement various classes of agent behaviors...
Keith Decker, Anandeep Pannu, Katia P. Sycara, Mik...
AMI
2010
Springer
13 years 6 months ago
A Distributed Many-Camera System for Multi-person Tracking
This article presents a modular, distributed and scalable many-camera system designed towards tracking multiple people simultaneously in a natural human-robot interaction scenario ...
Claus Lenz, Thorsten Röder, Martin Eggers, Si...
ICDCSW
2002
IEEE
14 years 13 days ago
Switchboard: Secure, Monitored Connections for Client-Server Communication
Prolonged secure communication requires trust relationships that extend throughout a connection’s life cycle. Current tools to establish secure connections such as SSL/TLS and S...
Eric Freudenthal, Lawrence Port, Tracy Pesin, Edwa...
ISVLSI
2003
IEEE
147views VLSI» more  ISVLSI 2003»
14 years 22 days ago
Automated Dynamic Memory Data Type Implementation Exploration and Optimization
The behavior of many algorithms is heavily determined by the input data. Furthermore, this often means that multiple and completely different execution paths can be followed, also...
Marc Leeman, Chantal Ykman-Couvreur, David Atienza...