Sciweavers

5446 search results - page 1057 / 1090
» Software Architecture - Introduction
Sort
View
129
Voted
WPES
2005
ACM
15 years 8 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
107
Voted
ADBIS
2005
Springer
147views Database» more  ADBIS 2005»
15 years 8 months ago
Declarative Data Fusion - Syntax, Semantics, and Implementation
In today’s integrating information systems data fusion, i.e., the merging of multiple tuples about the same real-world object into a single tuple, is left to ETL tools and other ...
Jens Bleiholder, Felix Naumann
DIGRA
2005
Springer
15 years 8 months ago
Framing Virtual Law
Building on the work of games theorists and virtual world designers, this paper proposes a framework for understanding the real-virtual dichotomy in terms of a series of five fram...
Peter Edelmann
143
Voted
EMSOFT
2005
Springer
15 years 8 months ago
Optimizing inter-processor data locality on embedded chip multiprocessors
Recent research in embedded computing indicates that packing multiple processor cores on the same die is an effective way of utilizing the ever-increasing number of transistors. T...
Guilin Chen, Mahmut T. Kandemir
133
Voted
EMSOFT
2005
Springer
15 years 8 months ago
A sink-n-hoist framework for leakage power reduction
Power leakage constitutes an increasing fraction of the total power consumption in modern semiconductor technologies. Recent research efforts have tried to integrate architecture...
Yi-Ping You, Chung-Wen Huang, Jenq Kuen Lee
« Prev « First page 1057 / 1090 Last » Next »