Sciweavers

8655 search results - page 1311 / 1731
» Challenges for Trusted Computing
Sort
View
EDOC
2006
IEEE
15 years 10 months ago
Exploring Intentional Modeling and Analysis for Enterprise Architecture
— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Eric S. K. Yu, Markus Strohmaier, Xiaoxue Deng
ETS
2006
IEEE
108views Hardware» more  ETS 2006»
15 years 10 months ago
A DFT Architecture for Asynchronous Networks-on-Chip
The Networks-on-Chip (NoCs) paradigm is emerging as a solution for the communication of SoCs. Many NoC architecture propositions are presented but few works on testing these netwo...
Xuan-Tu Tran, Jean Durupt, François Bertran...
HAPTICS
2006
IEEE
15 years 10 months ago
Control and Performance of the Rotational-to-Linear Cobotic Transmission
We examine the motion control bandwidth and stable impedance range of the Cobotic Hand Controller, a novel, six-degree-offreedom, admittance controlled haptic display. A highly ge...
Eric L. Faulring, J. Edward Colgate, Michael A. Pe...
HICSS
2006
IEEE
152views Biometrics» more  HICSS 2006»
15 years 10 months ago
Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks
— Uniform sampling in networks is at the core of a wide variety of randomized algorithms. Random sampling can be performed by modeling the system as an undirected graph with asso...
Asad Awan, Ronaldo A. Ferreira, Suresh Jagannathan...
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
15 years 10 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
« Prev « First page 1311 / 1731 Last » Next »