Sciweavers

3571 search results - page 676 / 715
» On the Power of Imperfect Information
Sort
View
CODES
2008
IEEE
13 years 10 months ago
Application specific non-volatile primary memory for embedded systems
Memory subsystems have been considered as one of the most critical components in embedded systems and furthermore, displaying increasing complexity as application requirements div...
Kwangyoon Lee, Alex Orailoglu
DCOSS
2008
Springer
13 years 10 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
BCS
2008
13 years 10 months ago
Beatbox - A Computer Simulation Environment for Computational Biology of the Heart
Despite over a century's study, the trigger mechanisms of cardiac arrhythmias are poorly understood. Even modern experimental methods do not provide sufficient temporal and s...
Ross McFarlane, Irina V. Biktasheva
CCE
2007
13 years 10 months ago
A Web Services based Approach for System on a Chip Design Planning
: The concept of Virtual Organisation (VO) offers various solutions to management, collaboration and coordination issues important for distributed collaborating teams. Deployment o...
Maciej Witczynski, Edward Hrynkiewicz, Adam Pawlak
DGO
2007
121views Education» more  DGO 2007»
13 years 10 months ago
Social capital and ICT adoption in the public sector
Although the research domain on social capital and the adoption of Information and Communication Technologies (ICTs) is relatively immature, there is a fast growing body of eviden...
Noor Huijboom