Sciweavers

1469 search results - page 278 / 294
» Design and Implementation of Software Objects in Hardware
Sort
View
SENSYS
2009
ACM
15 years 4 months ago
Canopy closure estimates with GreenOrbs: sustainable sensing in the forest
Motivated by the needs of precise forest inventory and realtime surveillance for ecosystem management, in this paper we present GreenOrbs [1], a wireless sensor network system and...
Lufeng Mo, Yuan He, Yunhao Liu, Jizhong Zhao, Shao...
VISUALIZATION
2003
IEEE
15 years 2 months ago
LightKit: A lighting system for effective visualization
LightKit is a system for lighting three-dimensional synthetic scenes. LightKit simplifies the task of producing visually pleasing, easily interpretable images for visualization w...
Michael Halle, Jeanette C. Meng
DRM
2006
Springer
15 years 1 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...
FUIN
2008
119views more  FUIN 2008»
14 years 9 months ago
Modeling Communication with Synchronized Environments
A deterministic behavior of systems composed of several modules is a desirable design goal. Assembling a complex system from components requires also a high degree of re-usability....
Tiberiu Seceleanu, Axel Jantsch
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
15 years 6 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...