Sciweavers

24529 search results - page 480 / 4906
» Computing on Authenticated Data
Sort
View
159
Voted
DSS
2002
231views more  DSS 2002»
15 years 4 months ago
Computational aspects of the FLBC framework
Recent research has sought to develop formal languages for business communication as more expressive, flexible and powerful alternatives to current electronic data interchange (ED...
Aspassia Daskalopulu, Marek J. Sergot
AAAI
2012
13 years 7 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
PERCOM
2005
ACM
16 years 4 months ago
Towards a Pervasive Computing Benchmark
Pervasive computing allows the coupling of the physical world to the information world, and provides a wealth of ubiquitous services and applications that allow users, machines, d...
Anand Ranganathan, Jalal Al-Muhtadi, Jacob T. Bieh...
ICPADS
2007
IEEE
15 years 11 months ago
Embedded education for Computer Rank Examination
Embedded system has become one of the most important directions in computer education. Embedded system is at the intersection of control system, command and control, wireless data...
Tianzhou Chen, Weihua Hu, Qingsong Shi, Hui Yan
154
Voted
ISCAS
2007
IEEE
202views Hardware» more  ISCAS 2007»
15 years 11 months ago
A VLSI Architecture for a Fast Computation of the 2-D Discrete Wavelet Transform
In this paper, an efficient VLSI architecture for a fast computation of the 2-D discrete wavelet transform (DWT) is proposed. The architecture employing a three-stage cascade in p...
Chengjun Zhang, Chunyan Wang, M. Omair Ahmad