Sciweavers

5638 search results - page 1068 / 1128
» On presence
Sort
View
INTEGRATION
2008
96views more  INTEGRATION 2008»
13 years 10 months ago
Implementation of a thermal management unit for canceling temperature-dependent clock skew variations
Thermal gradients across the die are becoming increasingly prominent as we scale further down into the sub-nanometer regime. While temperature was never a primary concern, its non...
Ashutosh Chakraborty, Karthik Duraisami, Ashoka Vi...
IJDE
2006
95views more  IJDE 2006»
13 years 10 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
IJMMS
2006
100views more  IJMMS 2006»
13 years 10 months ago
A cognitive approach to user perception of multimedia quality: An empirical investigation
Whilst multimedia technology has been one of the main contributing factors behind the Web's success, delivery of personalised multimedia content has been a desire seldom achi...
Sherry Y. Chen, Gheorghita Ghinea, Robert D. Macre...
IJNSEC
2006
162views more  IJNSEC 2006»
13 years 10 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
JAIR
2008
157views more  JAIR 2008»
13 years 10 months ago
Learning to Reach Agreement in a Continuous Ultimatum Game
It is well-known that acting in an individually rational manner, according to the principles of classical game theory, may lead to sub-optimal solutions in a class of problems nam...
Steven de Jong, Simon Uyttendaele, Karl Tuyls
« Prev « First page 1068 / 1128 Last » Next »