Sciweavers

2911 search results - page 500 / 583
» A Logic of Graph Constraints
Sort
View
112
Voted
ISLPED
2005
ACM
96views Hardware» more  ISLPED 2005»
15 years 6 months ago
Power-optimal repeater insertion considering Vdd and Vth as design freedoms
This work first presents an analytical repeater insertion method which optimizes power under delay constraint for a single net. This method finds the optimal repeater insertion ...
Yu Ching Chang, King Ho Tam, Lei He
125
Voted
SASN
2005
ACM
15 years 6 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
91
Voted
ATAL
2005
Springer
15 years 6 months ago
Allocation of indivisible goods: a general model and some complexity results
Many industrial or research activities are so expensive that it is often benefitable for the involved agents to cofund the construction or the purchase of a common required resou...
Sylvain Bouveret, Michel Lemaître, Hé...
102
Voted
ATAL
2005
Springer
15 years 6 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards
89
Voted
UML
2005
Springer
15 years 6 months ago
Explicit Platform Models for MDA
The main drive for Model-Driven Architecture is that many software applications have to be deployed on a variety of platforms. The way MDA achieves this is by transforming a platfo...
Dennis Wagelaar, Viviane Jonckers