Sciweavers

13043 search results - page 2271 / 2609
» Simulation of the research process
Sort
View
ASPDAC
2005
ACM
81views Hardware» more  ASPDAC 2005»
15 years 6 months ago
Power estimation starategies for a low-power security processor
In this paper, we present the power estimation methodologies for the development of a low-power security processor that contains significant amount of logic and memory. For the lo...
Yen-Fong Lee, Shi-Yu Huang, Sheng-Yu Hsu, I-Ling C...
ICCHP
2010
Springer
15 years 6 months ago
Redefining Assumptions: Accessibility and Its Stakeholders
Abstract. Accessibility is becoming more and more relevant in Information technologies, such as the Web and software applications, particularly due to the push on legislation to ma...
Rui Lopes, Karel Van Isacker, Luís Carri&cc...
DMSN
2005
ACM
15 years 6 months ago
Zone sharing: a hot-spots decomposition scheme for data-centric storage in sensor networks
In the resource over-constrained environment of sensor networks, techniques for storing data locally in sensor nodes have been proposed to support efficient processing of adhoc qu...
Mohamed Aly, Nicholas Morsillo, Panos K. Chrysanth...
ATAL
2007
Springer
15 years 6 months ago
Agents that remember can tell stories: integrating autobiographic memory into emotional agents
For the past few years many new applications are being developed featuring interactive environments populated with autonomous virtual agents capable of acting according to their g...
Wan Ching Ho, João Dias, Rui Figueiredo, An...
CNSR
2007
IEEE
158views Communications» more  CNSR 2007»
15 years 6 months ago
Bounding the Information Collection Performance of Wireless Sensor Network Routing
Wireless sensor networks have mainly been designed for information-collecting purposes, such as habitat monitoring, product process tracing, battlefield surveillance, etc. In orde...
Qinghua Wang, Tingting Zhang, Stefan Pettersson
« Prev « First page 2271 / 2609 Last » Next »