Sciweavers

175 search results - page 33 / 35
» Exploiting Style in Architectural Design Environments
Sort
View
IROS
2008
IEEE
151views Robotics» more  IROS 2008»
15 years 3 months ago
A foveated passive UHF RFID system for mobile manipulation
Abstract— We present a novel antenna and system architecture for mobile manipulation based on passive RFID technology operating in the 850MHz-950MHz ultra-high-frequency (UHF) sp...
Travis Deyle, Cressel D. Anderson, Charles C. Kemp...
100
Voted
IJDSN
2006
143views more  IJDSN 2006»
14 years 9 months ago
MicroRouting: A Scalable and Robust Communication Paradigm for Sparse Ad Hoc Networks
Mobile ad hoc networks are self-organizing networks that provide rapid network connectivity in infrastructureless environments. Most routing protocols designed for MANETs assume c...
Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu
96
Voted
DAC
2008
ACM
15 years 10 months ago
Parallel programming: can we PLEASE get it right this time?
The computer industry has a problem. As Moore's law marches on, we will be exploiting it to double cores, not frequencies. But all those cores ... 2 to 4 today growing to 8, ...
Tim Mattson, Michael Wrinn
PERCOM
2008
ACM
14 years 9 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
OOPSLA
2009
Springer
15 years 4 months ago
A concurrent dynamic analysis framework for multicore hardware
Software has spent the bounty of Moore’s law by solving harder problems and exploiting abstractions, such as highlevel languages, virtual machine technology, binary rewritdynami...
Jungwoo Ha, Matthew Arnold, Stephen M. Blackburn, ...