Sciweavers

5577 search results - page 208 / 1116
» E2K Technology and Implementation
Sort
View
AISS
2010
165views more  AISS 2010»
15 years 2 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
ASPDAC
2010
ACM
161views Hardware» more  ASPDAC 2010»
15 years 2 months ago
Novel dual-Vth independent-gate FinFET circuits
This paper describes gate work function and oxide thickness tuning to realize novel circuits using dual-Vth independent-gate FinFETs. Dual-Vth FinFETs with independent gates enabl...
Masoud Rostami, Kartik Mohanram
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 2 months ago
Information Delivery System through Bluetooth in Ubiquitous Networks
------------------------------------------------------ABSTRACT-------------------------------------------------------Ubiquitous and pervasive computing (UPC) is a popular paradigm ...
D. Asha Devi, M. Suresh Bab, V. L. Pavani, N. Geet...
IJAC
2011
15 years 8 days ago
Bringing the Everyday Life into Engineering Education
— To successfully design and engineer solutions for today’s and tomorrow’s rapidly changing and expanding global contexts, in which people are confronted with new opportuniti...
Gert Pasman, Ingrid Mulder
IJNSEC
2011
272views more  IJNSEC 2011»
15 years 8 days ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...