Sciweavers

4636 search results - page 751 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
DATE
2003
IEEE
101views Hardware» more  DATE 2003»
15 years 4 months ago
Energy Estimation for Extensible Processors
This paper presents an efficient methodology for estimating the energy consumption of application programs running on extensible processors. Extensible processors, which are incr...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
TMC
2012
13 years 1 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
79
Voted
BMCBI
2010
116views more  BMCBI 2010»
14 years 11 months ago
Optimization algorithms for functional deimmunization of therapeutic proteins
Background: To develop protein therapeutics from exogenous sources, it is necessary to mitigate the risks of eliciting an anti-biotherapeutic immune response. A key aspect of the ...
Andrew S. Parker, Wei Zheng, Karl E. Griswold, Chr...
SMA
2003
ACM
173views Solid Modeling» more  SMA 2003»
15 years 4 months ago
Automating the CAD/CAE dimensional reduction process
Dimensional reduction is a simplification technique that eliminates one or more dimensions from a boundary value problem. It results in significant computational savings with mini...
Krishnan Suresh
103
Voted
DATE
2006
IEEE
114views Hardware» more  DATE 2006»
15 years 2 months ago
Compositional, efficient caches for a chip multi-processor
In current multi-media systems major parts of the functionality consist of software tasks executed on a set of concurrently operating processors. Those tasks interfere with each o...
Anca Mariana Molnos, Marc J. M. Heijligers, Sorin ...