Sciweavers

24529 search results - page 4521 / 4906
» Computing on Authenticated Data
Sort
View
JEC
2006
71views more  JEC 2006»
15 years 4 months ago
Destructive-read in embedded DRAM, impact on power consumption
This paper explores power consumption for destructive-read embedded DRAM. Destructive-read DRAM is based on conventional DRAM design, but with sense amplifiers optimized for lower ...
Haakon Dybdahl, Per Gunnar Kjeldsberg, Marius Gran...
JGTOOLS
2006
125views more  JGTOOLS 2006»
15 years 4 months ago
GPU-Based Tiled Ray Casting Using Depth Peeling
We propose a new hardware ray casting algorithm for unstructured meshes composed of tetrahedral cells. Our work builds on the technique published at IEEE Visualization 2003 by Wei...
Fábio F. Bernardon, Christian Azambuja Pago...
162
Voted
JIPS
2006
110views more  JIPS 2006»
15 years 4 months ago
Monitoring Systems for Embedded Equipment in Ubiquitous Environments
: Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provide...
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho...
130
Voted
KI
2008
Springer
15 years 4 months ago
A Framework for Mobile Intention Recognition in Spatially Structured Environments
Abstract. Mobile intention recognition is the problem of inferring an agent's intentions from the spatio-temporal behavior she shows. We present a framework for mobile intenti...
Peter Kiefer, Klaus Stein
161
Voted
JMLR
2006
131views more  JMLR 2006»
15 years 4 months ago
On Representing and Generating Kernels by Fuzzy Equivalence Relations
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
Bernhard Moser
« Prev « First page 4521 / 4906 Last » Next »