Sciweavers

8655 search results - page 1288 / 1731
» Challenges for Trusted Computing
Sort
View
VRST
2009
ACM
15 years 11 months ago
A semantic environment model for crowd simulation in multilayered complex environment
Simulating crowds in complex environment is fascinating and challenging, however, modeling of the environment is always neglected in the past, which is one of the essential proble...
Hao Jiang, Wenbin Xu, Tianlu Mao, Chunpeng Li, Shi...
HRI
2010
ACM
15 years 11 months ago
Judging a bot by its cover: an experiment on expectation setting for personal robots
—Managing user expectations of personal robots becomes particularly challenging when the end-user just wants to know what the robot can do, and neither understands nor cares abou...
Steffi Paepcke, Leila Takayama
AICCSA
2008
IEEE
245views Hardware» more  AICCSA 2008»
15 years 11 months ago
Rapid and robust ranking of text documents in a dynamically changing corpus
Ranking documents in a selected corpus plays an important role in information retrieval systems. Despite notable advances in this direction, with continuously accumulating text do...
Byung-Hoon Park, Nagiza F. Samatova, Rajesh Munava...
ASAP
2008
IEEE
167views Hardware» more  ASAP 2008»
15 years 11 months ago
Extending the SIMPPL SoC architectural framework to support application-specific architectures on multi-FPGA platforms
Process technology has reduced in size such that it is possible to implement complete applicationspecific architectures as Systems-on-Chip (SoCs) using both Application-Specific I...
David Dickin, Lesley Shannon
ASAP
2008
IEEE
142views Hardware» more  ASAP 2008»
15 years 11 months ago
Managing multi-core soft-error reliability through utility-driven cross domain optimization
As semiconductor processing technology continues to scale down, managing reliability becomes an increasingly difficult challenge in high-performance microprocessor design. Transie...
Wangyuan Zhang, Tao Li
« Prev « First page 1288 / 1731 Last » Next »