Sciweavers

691 search results - page 48 / 139
» Control Choices and Network Effects in Hypertext Systems
Sort
View
128
Voted
CASES
2006
ACM
15 years 7 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
93
Voted
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
15 years 7 months ago
Quantifying trade-offs in resource allocation for VPNs
Virtual Private Networks (VPNs) feature notable characteristics in structure and traffic patterns that allow for efficient resource allocation. A strategy that exploits the underl...
Satish Raghunath, Shivkumar Kalyanaraman, K. K. Ra...
90
Voted
ICN
2009
Springer
15 years 8 months ago
An Automotive Security System for Anti-theft
— Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. In this paper, we present an automotive security system t...
Huaqun Guo, H. S. Cheng, Yong Dong Wu, J. J. Ang, ...
IJCAI
2007
15 years 3 months ago
A Cortex-Inspired Neural-Symbolic Network for Knowledge Representation
Semantic systems for the representation of declarative knowledge are usually unconnected to neurobiological mechanisms in the brain. In this paper we report on efforts to bridge t...
Florian Röhrbein, Julian Eggert, Edgar Kö...
CEC
2005
IEEE
15 years 7 months ago
Single parent genetic programming
The most controversial part of genetic programming is its highly disruptive and potentially innovative subtree crossover operator. The clearest problem with the crossover operator...
Wendy Ashlock, Dan Ashlock