Sciweavers

631 search results - page 98 / 127
» Composable memory transactions
Sort
View
80
Voted
UIST
1994
ACM
15 years 1 months ago
Blending Structured Graphics and Layout
Conventional windowing environments provide separate classes of objects for user interface components, or "widgets," and graphical objects. Widgets negotiate layout and ...
Steven H. Tang, Mark A. Linton
77
Voted
EUROPAR
2006
Springer
15 years 1 months ago
COPRA - A Communication Processing Architecture for Wireless Sensor Networks
Abstract. Typical sensor nodes are composed of cheap hardware because they have to be affordable in great numbers. This means that memory and communication bandwidth are small, CPU...
Reinhardt Karnapke, Jörg Nolte
ICONIP
1998
14 years 11 months ago
A Telephone Number Corrector Using a Counterpropagation Network
This paper describes the implementation of a system that reminds the user of the telephone number of a given list, even if the user only remembers part of it, or if the given numb...
Juan Moreno García, Gabriel Sebastiá...
IJON
2006
67views more  IJON 2006»
14 years 9 months ago
Robust persistent activity in neural fields with asymmetric connectivity
Modeling studies have shown that recurrent interactions within neural networks are capable of self-sustaining non-uniform activity profiles. These patterns are thought to be the n...
Cláudia Horta, Wolfram Erlhagen
INFOCOM
2010
IEEE
14 years 8 months ago
High Performance Dictionary-Based String Matching for Deep Packet Inspection
—Dictionary-Based String Matching (DBSM) is used in network Deep Packet Inspection (DPI) applications virus scanning [1] and network intrusion detection [2]. We propose the Pipel...
Yi-Hua Edward Yang, Hoang Le, Viktor K. Prasanna