Sciweavers

186 search results - page 33 / 38
» Technology diffusion: analysing the diffusion of agent techn...
Sort
View
BLISS
2009
IEEE
13 years 9 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
HVEI
2009
13 years 6 months ago
Ecological optics of natural materials and light fields
The appearance of objects in scenes is determined by their shape, material properties and by the light field, and, in contradistinction, the appearance of those objects provides u...
Sylvia C. Pont
ICWSM
2009
13 years 6 months ago
Content Based Recommendation and Summarization in the Blogosphere
This paper presents a stochastic graph based method for recommending or selecting a small subset of blogs that best represents a much larger set. within a certain topic. Each blog...
Ahmed Hassan, Dragomir R. Radev, Junghoo Cho, Amru...
ASPDAC
2011
ACM
297views Hardware» more  ASPDAC 2011»
13 years 7 days ago
CELONCEL: Effective design technique for 3-D monolithic integration targeting high performance integrated circuits
3-D monolithic integration (3DMI), also termed as sequential integration, is a potential technology for future gigascale circuits. Since the device layers are processed in sequent...
Shashikanth Bobba, Ashutosh Chakraborty, Olivier T...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 1 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....