Sciweavers

820 search results - page 129 / 164
» Memory System Connectivity Exploration
Sort
View
120
Voted
ACMIDC
2008
15 years 4 months ago
Playing with the sound maker: do embodied metaphors help children learn?
In this paper we present the results of a comparative study that explores the potential benefits of using embodied ion to help children, aged 7 to 10, learn abstract concepts rela...
Alissa Nicole Antle, Milena Droumeva, Greg Corness
172
Voted
WIA
2004
Springer
15 years 8 months ago
A BDD-Like Implementation of an Automata Package
In this paper we propose a new data structure, called shared automata, for representing deterministic finite automata (DFA). Shared automata admit a strong canonical form for DFA ...
Jean-Michel Couvreur
CSB
2003
IEEE
130views Bioinformatics» more  CSB 2003»
15 years 8 months ago
A Computational Approach to Reconstructing Gene Regulatory Networks
Reverse-engineering of gene networks using linear models often results in an underdetermined system because of excessive unknown parameters. In addition, the practical utility of ...
Xutao Deng, Hesham H. Ali
134
Voted
MA
1999
Springer
110views Communications» more  MA 1999»
15 years 6 months ago
Hive: Distributed Agents for Networking Things
Hive is a distributed agents platform, a decentralized system for building applications by networking local system resources. This paper presents the architecture of Hive, concent...
Nelson Minar, Matthew Gray, Oliver Roup, Raffi Kri...
121
Voted
CEE
2007
110views more  CEE 2007»
15 years 2 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...