Sciweavers

8655 search results - page 1183 / 1731
» Challenges for Trusted Computing
Sort
View
CAD
2002
Springer
15 years 4 months ago
Product variety optimization under modular architecture
This paper discusses product variety design under optimization viewpoint. Product variety design means the challenge to simultaneously design multiple products toward higher optim...
Kikuo Fujita
COMCOM
2000
105views more  COMCOM 2000»
15 years 4 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
DCC
2000
IEEE
15 years 4 months ago
Data Partitioning and Reversible Variable Length Codes for Robust Video Communications
Low bit-rate multimedia communication over wireless channels has received much attention recently. A key challenge in low bit-rate wireless communication is the very high error ra...
Adam H. Li, Surin Kittitornkun, Yu Hen Hu, Dong-Se...
FGCS
2007
78views more  FGCS 2007»
15 years 4 months ago
Promoting performance and separation of concerns for data mining applications on the grid
Grid Computing brought the promise of making high-performance computing cheaper and more easily available than traditional supercomputing platforms. Such a promise was very well r...
Vasco Furtado, Francisco Flávio de Souza, W...
144
Voted
AI
1999
Springer
15 years 4 months ago
Experiences with an Interactive Museum Tour-Guide Robot
This article describes the software architecture of an autonomous, interactive tour-guide robot. It presents a modular, distributed software architecture, which integrates localiz...
Wolfram Burgard, Armin B. Cremers, Dieter Fox, Dir...
« Prev « First page 1183 / 1731 Last » Next »