Sciweavers

1022 search results - page 144 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
JSS
2006
111views more  JSS 2006»
13 years 9 months ago
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog
Web and peer-to-peer systems have emerged as popular areas in distributed computing, and their integrated usage permits the benefits of both to be exploited. While much work in th...
Seng Wai Loke
EH
2002
IEEE
113views Hardware» more  EH 2002»
14 years 1 months ago
Evolution in materio: Looking Beyond the Silicon Box
It is argued that natural evolution is, par excellence, an algorithm that exploits the physical properties of materials. Such an exploitation of the physical characteristics has a...
Julian F. Miller, Keith L. Downing
MAM
2002
128views more  MAM 2002»
13 years 8 months ago
Component-based development of DSP software for mobile communication terminals
DSP software development has been tied down by extreme computational requirements. Furthermore, the DSP development tools available today are less advanced than in other embedded ...
Kari Jyrkkä, Olli Silvén, Olli Ali-Yrk...
DAC
2008
ACM
14 years 10 months ago
Concurrent topology and routing optimization in automotive network integration
In this paper, a novel automatic approach for the concurrent topology and routing optimization that achieves a high quality network layout is proposed. This optimization is based ...
Bardo Lang, Christian Haubelt, Jürgen Teich, ...
MONET
2006
107views more  MONET 2006»
13 years 9 months ago
Utilization and fairness in spectrum assignment for opportunistic spectrum access
The Open Spectrum approach to spectrum access can achieve near-optimal utilization by allowing devices to sense and utilize available spectrum opportunistically. However, a naive d...
Chunyi Peng, Haitao Zheng, Ben Y. Zhao