Sciweavers

3955 search results - page 419 / 791
» Comparing the Power of Robots
Sort
View
CHES
2006
Springer
119views Cryptology» more  CHES 2006»
15 years 8 months ago
NanoCMOS-Molecular Realization of Rijndael
This paper describes the implementation of the Advanced Encryption Standard Algorithm, Rijndael, in a new nanoscale technology, called CMOL. This technology consists of an array of...
Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian
CASES
2001
ACM
15 years 8 months ago
The performance and energy consumption of three embedded real-time operating systems
This paper presents the modeling of embedded systems with SimBed, an execution-driven simulation testbed that measures the execution behavior and power consumption of embedded app...
Kathleen Baynes, Chris Collins, Eric Fiterman, Bri...
ZUM
2000
Springer
15 years 8 months ago
A Computation Model for Z Based on Concurrent Constraint Resolution
We present a computation model for Z, which is based on a reduction to a small calculus, called Z, and on concurrent constraint resolution techniques applied for computing in thi...
Wolfgang Grieskamp
115
Voted
INTERACT
2007
15 years 6 months ago
In and Out of the Hospital: The Hidden Interface of High Fidelity Research Via RFID
The use of RFID technology in HCI research is emerging. We identify its promising application in the healthcare sector by empowering the process of capturing, extracting and analyz...
Svetlena Taneva, Effie Law
ICANN
2010
Springer
15 years 5 months ago
On Estimating Mutual Information for Feature Selection
Abstract. Mutual Information (MI) is a powerful concept from information theory used in many application fields. For practical tasks it is often necessary to estimate the Mutual In...
Erik Schaffernicht, Robert Kaltenhaeuser, Saurabh ...