Sciweavers

1518 search results - page 277 / 304
» Cryptographic Test Correction
Sort
View
ISLPED
2004
ACM
139views Hardware» more  ISLPED 2004»
15 years 5 months ago
Eliminating voltage emergencies via microarchitectural voltage control feedback and dynamic optimization
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Kim M. Hazelwood, David Brooks
101
Voted
SENSYS
2004
ACM
15 years 5 months ago
Synopsis diffusion for robust aggregation in sensor networks
Previous approaches for computing duplicate-sensitive aggregates in sensor networks (e.g., in TAG) have used a tree topology, in order to conserve energy and to avoid double-count...
Suman Nath, Phillip B. Gibbons, Srinivasan Seshan,...
OOPSLA
2004
Springer
15 years 5 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
98
Voted
SEMWEB
2004
Springer
15 years 5 months ago
Towards a Symptom Ontology for Semantic Web Applications
As the use of Semantic Web ontologies continues to expand there is a growing need for tools that can validate ontological consistency and provide guidance in the correction of dete...
Kenneth Baclawski, Christopher J. Matheus, Mieczys...
96
Voted
CBMS
2003
IEEE
15 years 5 months ago
An Imaging System Correlating Lip Shapes with Tongue Contact Patterns for Speech Pathology Research
In this research, an imaging system was built to work with a newly developed electronic device to help people produce sounds correctly. The system consists of two parts, the inter...
D. J. Lee, Daniel Bates, Christopher Dromey, Xiaoq...