Sciweavers

COMPUTER
2008
75views more  COMPUTER 2008»
13 years 11 months ago
Cybersecurity Strategies: The QuERIES Methodology
Lawrence Carin, George Cybenko, Jeff Hughes
COMPUTER
2008
46views more  COMPUTER 2008»
13 years 11 months ago
Efficient Embedded Computing
William J. Dally, James D. Balfour, David Black-Sc...
COMPUTER
2008
65views more  COMPUTER 2008»
13 years 11 months ago
BioSig: A Free and Open Source Software Library for BCI Research
Alois Schlögl, Clemens Brunner
COMPUTER
2008
90views more  COMPUTER 2008»
13 years 11 months ago
Challenges and Lessons in Developing Middleware on Smart Phones
Near-ubiquitous smart phones are the most promising heralds of future pervasive computing. However, despite their increasing capabilities in computation, communication, and sensin...
Oriana Riva, Jaakko Kangasharju
COMPUTER
2008
58views more  COMPUTER 2008»
13 years 11 months ago
Let Us Entertain You
John Funge
COMPUTER
2008
66views more  COMPUTER 2008»
13 years 11 months ago
Bridging the Software Architecture Gap
Mikael Lindvall, Dirk Muthig
COMPUTER
2008
60views more  COMPUTER 2008»
13 years 11 months ago
Enabling Next-Generation RFID Applications: Solutions and Challenges
Quan Z. Sheng, Xue Li, Sherali Zeadally
COMPUTER
2008
57views more  COMPUTER 2008»
13 years 11 months ago
Brain-Computer Interfaces, Virtual Reality, and Videogames
Anatole Lécuyer, Fabien Lotte, Richard B. R...