Sciweavers

931 search results - page 147 / 187
» Controlled Experimentation with Agents - Models and Implemen...
Sort
View
CODES
2007
IEEE
15 years 6 months ago
A low power VLIW processor generation method by means of extracting non-redundant activation conditions
This paper proposes a low power VLIW processor generation method by automatically extracting non-redundant activation conditions of pipeline registers for clock gating. It is impo...
Hirofumi Iwato, Keishi Sakanushi, Yoshinori Takeuc...
SISW
2005
IEEE
15 years 5 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
89
Voted
SENSYS
2003
ACM
15 years 5 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
AUTONOMICS
2008
ACM
15 years 1 months ago
Design of a fence surveillance system based on wireless sensor networks
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...
BMCBI
2010
130views more  BMCBI 2010»
14 years 12 months ago
MLPAinter for MLPA interpretation: an integrated approach for the analysis, visualisation and data management of Multiplex Ligat
Background: Multiplex Ligation-Dependent Probe Amplification (MLPA) is an application that can be used for the detection of multiple chromosomal aberrations in a single experiment...
Ronald van Eijk, Paul H. C. Eilers, Remco Natt&eac...