Sciweavers

107 search results - page 17 / 22
» Some Applications of Bounds for Designs to the Cryptography
Sort
View
CHI
2004
ACM
14 years 7 months ago
3Book: a scalable 3D virtual book
This paper describes the 3Book, a 3D interactive visualization of a codex book as a component for digital library and information-intensive applications. The 3Book is able to repr...
Stuart K. Card, Lichan Hong, Jock D. Mackinlay, Ed...
ICCAD
2006
IEEE
119views Hardware» more  ICCAD 2006»
14 years 3 months ago
Post-placement voltage island generation
High power consumption will shorten battery life for handheld devices and cause thermal and reliability problems. One way to lower the dynamic power consumption is to reduce the s...
Royce L. S. Ching, Evangeline F. Y. Young, Kevin C...
VEE
2006
ACM
115views Virtualization» more  VEE 2006»
14 years 20 days ago
Live updating operating systems using virtualization
Many critical IT infrastructures require non-disruptive operations. However, the operating systems thereon are far from perfect that patches and upgrades are frequently applied, i...
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, ...
ESA
2006
Springer
140views Algorithms» more  ESA 2006»
13 years 10 months ago
Latency Constrained Aggregation in Sensor Networks
A sensor network consists of sensing devices which may exchange data through wireless communication. A particular feature of sensor networks is that they are highly energy constrai...
Luca Becchetti, Peter Korteweg, Alberto Marchetti-...
BMCBI
2006
100views more  BMCBI 2006»
13 years 6 months ago
Towards a better solution to the shortest common supersequence problem: the deposition and reduction algorithm
Background: The problem of finding a Shortest Common Supersequence (SCS) of a set of sequences is an important problem with applications in many areas. It is a key problem in biol...
Kang Ning, Hon Wai Leong