Sciweavers

1470 search results - page 199 / 294
» DEFACTO: A Design Environment for Adaptive Computing Technol...
Sort
View
IRI
2005
IEEE
15 years 3 months ago
Issues of hierarchical heterogeneous modeling in component reusability
Heterogeneous systems are systems that obey different functioning laws. For instance, during the design of embedded systems, it is generally necessary to study both the controller...
Aimé Mokhoo Mbobi, Frédéric B...
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
15 years 2 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris
OTM
2007
Springer
15 years 4 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
IMC
2007
ACM
14 years 11 months ago
Studying wireless routing link metric dynamics
Multi-hop wireless mesh networks are increasingly being deployed for last-mile Internet access. Typically, network algorithms such as routing, channel assignment and topology cont...
Saumitra M. Das, Himabindu Pucha, Konstantina Papa...
CHI
2005
ACM
15 years 10 months ago
The uses of personal networked digital imaging: an empirical study of cameraphone photos and sharing
Developments in networked digital imaging promise to substantially affect the near-universal experience of personal photography. Designing technology for image capture and sharing...
Nancy A. Van House, Marc Davis, Morgan Ames, Megan...