Sciweavers

4764 search results - page 708 / 953
» Applications of Error-Control Coding
Sort
View
ET
2008
92views more  ET 2008»
15 years 4 months ago
Hardware and Software Transparency in the Protection of Programs Against SEUs and SETs
Processor cores embedded in systems-on-a-chip (SoCs) are often deployed in critical computations, and when affected by faults they may produce dramatic effects. When hardware harde...
Eduardo Luis Rhod, Carlos Arthur Lang Lisbôa...
PUC
2007
117views more  PUC 2007»
15 years 3 months ago
Mobile Fair Diary: hybrid interface for taking, browsing and sharing context-aware notes
This paper describes the Mobile Fair Diary (MFD), which is designed to allow a housing fair customer to make a personalized digital recording of his/ her visit to a hectic fairgrou...
Jani Korhonen, Timo Ojala, Annu Ristola, Manne Kes...
EWC
2010
91views more  EWC 2010»
15 years 3 months ago
Multiobjective global surrogate modeling, dealing with the 5-percent problem
When dealing with computationally expensive simulation codes or process measurement data, surrogate modeling methods are firmly established as facilitators for design space explor...
Dirk Gorissen, Ivo Couckuyt, Eric Laermans, Tom Dh...
MICS
2010
94views more  MICS 2010»
15 years 2 months ago
Arrangements on Parametric Surfaces I: General Framework and Infrastructure
We introduce a framework for the construction, maintenance, and manipulation of arrangements of curves embedded on certain two-dimensional orientable parametric surfaces in three-d...
Eric Berberich, Efi Fogel, Dan Halperin, Kurt Mehl...
RFIDSEC
2010
15 years 2 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...