Sciweavers

1663 search results - page 37 / 333
» Scheduling techniques for media-on-demand
Sort
View
SECURWARE
2008
IEEE
14 years 4 months ago
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
—We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the comple...
Frederic Stumpf, Claudia Eckert
IJCSA
2008
104views more  IJCSA 2008»
13 years 9 months ago
Artificial Intelligence and Bluetooth Techniques in a Multi-user M-learning Domain
In this paper we present a practical implementation of a multiuser technical laboratory that combines Artificial Intelligence (AI) and Bluetooth (BT) techniques. The objective is ...
Bonifacio Castaño, Angel Moreno, Melquiades...
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 4 months ago
Digraph description of k-interchange technique for optimization over permutations and adaptive algorithm system
The paper describes a general glance to the use of element exchange techniques for optimization over permutations. A multi-level description of problems is proposed which is a fund...
Mark Sh. Levin
CONTEXT
2007
Springer
14 years 3 months ago
CAMOU: A Simple Integrated eLearning and Planning Techniques Tool
In this paper we present an educational tool which has been designed to manage (learning) knowledge acquired from the interactions with the students, and to automatically aids educ...
David Camacho, María Dolores Rodrígu...
MICRO
1993
IEEE
128views Hardware» more  MICRO 1993»
14 years 1 months ago
Techniques for extracting instruction level parallelism on MIMD architectures
Extensive research has been done on extracting parallelism from single instruction stream processors. This paper presents some results of our investigation into ways to modify MIM...
Gary S. Tyson, Matthew K. Farrens