Sciweavers

7080 search results - page 1078 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
135
Voted
WWW
2007
ACM
16 years 5 months ago
Connecting the "bottom of the pyramid": an exploratory case study of india's rural communication environment
This paper is based on our exploratory study of a South Indian village in Chamrajanagar district of Karnataka. The study was to understand the rural communication environment and ...
Sarita Seshagiri, Sagar Aman, Dhaval Joshi
DAC
2008
ACM
15 years 6 months ago
Leakage power-aware clock skew scheduling: converting stolen time into leakage power reduction
Clock skew scheduling has been traditionally considered as a tool for improving the clock period in a sequential circuit. Timing slack is "stolen" from fast combinationa...
Min Ni, Seda Ogrenci Memik
172
Voted
BMCBI
2010
153views more  BMCBI 2010»
15 years 4 months ago
GOAL: A software tool for assessing biological significance of genes groups
Background: Modern high throughput experimental techniques such as DNA microarrays often result in large lists of genes. Computational biology tools such as clustering are then us...
Alain B. Tchagang, Alexander Gawronski, Hugo B&eac...
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
15 years 11 months ago
Haptic feedback for molecular simulation
— In this paper, a new tool dedicated to the analysis and the conception of molecules is presented. It is composed of an adaptive simulation software and a haptic device used to ...
Aude Bolopion, Barthelemy Cagneau, Stephane Redon,...
IWNAS
2008
IEEE
15 years 11 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
« Prev « First page 1078 / 1416 Last » Next »