Sciweavers

172 search results - page 23 / 35
» Socio-cognitive engineering: A methodology for the design of...
Sort
View
IH
2001
Springer
13 years 12 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
JUCS
2010
214views more  JUCS 2010»
13 years 6 months ago
Multi-Device Context-Aware RIAs Using a Model-Driven Approach
: Model-Driven Development concepts are exhibiting as a good engineering solution for the design of ubiquitous applications with multi-device user interfaces and other contextaware...
Marino Linaje Trigueros, Juan Carlos Preciado, Fer...
WWW
2004
ACM
14 years 8 months ago
HPG: a tool for presentation generation in WIS
Web Information Systems (WIS) support the process of retrieving information from sources on the Web and of presenting them as a hypermedia presentation. Most WIS design ogies focu...
Bas Rutten, Peter Barna, Flavius Frasincar, Geert-...
CODES
2004
IEEE
13 years 11 months ago
Analytical models for leakage power estimation of memory array structures
There is a growing need for accurate power models at the system level. Memory structures such as caches, Branch Target Buffers (BTBs), and register files occupy significant area i...
Mahesh Mamidipaka, Kamal S. Khouri, Nikil D. Dutt,...
DDECS
2007
IEEE
201views Hardware» more  DDECS 2007»
14 years 1 months ago
Built in Defect Prognosis for Embedded Memories
: As scan compression replaces the traditional scan it is important to understand how it works with power. DFT MAX represents one of the two primary scan compression solutions used...
Prashant Dubey, Akhil Garg, Sravan Kumar Bhaskaran...