Sciweavers

739 search results - page 108 / 148
» Information Flow in Credential Systems
Sort
View
ENTCS
2008
92views more  ENTCS 2008»
13 years 7 months ago
Redundancy Elimination for LF
We present a type system extending the dependent type theory LF, whose terms are more amenable to compact representation. This is achieved by carefully omitting certain subterms w...
Jason Reed
CSCW
2008
ACM
13 years 9 months ago
Evaluating the deployment of a mobile technology in a hospital ward
Since health care teams are often distributed across time and location, information sharing is crucial for effective patient care. Studying the use of a mobile information technol...
Charlotte Tang, M. Sheelagh T. Carpendale
LISA
2008
13 years 10 months ago
Topnet: A Network-aware top(1)
System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time d...
Antonis Theocharides, Demetres Antoniades, Michali...
FPGA
2005
ACM
97views FPGA» more  FPGA 2005»
14 years 1 months ago
Techniques for synthesizing binaries to an advanced register/memory structure
Recent works demonstrate several benefits of synthesizing software binaries onto FPGA hardware, including incorporating hardware design into established software tool flows with m...
Greg Stitt, Zhi Guo, Walid A. Najjar, Frank Vahid
SIPS
2006
IEEE
14 years 1 months ago
Molecular quantum-dot cellular automata
: Molecular electronics is commonly conceived as reproducing diode or transistor action at the molecular level. The quantum-dot cellular automata (QCA) approach offers an attractiv...
Craig S. Lent