Sciweavers

6229 search results - page 1081 / 1246
» Models of Computation for Networks on Chip
Sort
View
EUROPAR
2001
Springer
14 years 2 months ago
Optimal Many-to-One Routing on the Mesh with Constant Queues
We present randomized and deterministic algorithms for many-to-one routing on an n-node two-dimensional mesh under the store-and-forward model of packet routing. We consider the g...
Andrea Pietracaprina, Geppino Pucci
DATE
2000
IEEE
103views Hardware» more  DATE 2000»
14 years 2 months ago
Protocol Stack-Based Telecom-Emulator
The paper describes the concept and implementation of a telecom emulator that features both recon gurability and high-speed processing. The emulator can be easily transmuted into ...
Takahiro Murooka, Toshiaki Miyazaki
AH
2000
Springer
14 years 2 months ago
A Connectionist Approach for Supporting Personalized Learning in a Web-Based Learning Environment
The paper investigates the use of computational intelligence for adaptive lesson presentation in a Web-based learning environment. A specialized connectionist architecture is devel...
Kyparisia A. Papanikolaou, George D. Magoulas, Mar...
AUIC
2004
IEEE
14 years 2 months ago
A Knowledge Management Approach to User Support
This paper considers the problem of computer user support and workplace learning in general. Theoretically our work is influenced by ideas on knowledge management, expertise netwo...
R. T. Jim Eales
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
14 years 2 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
« Prev « First page 1081 / 1246 Last » Next »