Sciweavers

1995 search results - page 368 / 399
» From Data Flow Networks to Process Algebras
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 3 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
ICANN
2005
Springer
15 years 3 months ago
Learning Features of Intermediate Complexity for the Recognition of Biological Motion
Humans can recognize biological motion from strongly impoverished stimuli, like point-light displays. Although the neural mechanism underlying this robust perceptual process have n...
Rodrigo Sigala, Thomas Serre, Tomaso Poggio, Marti...
ICCS
2005
Springer
15 years 3 months ago
A Computational Model of Micro-vascular Growth
In order to supply a growing tissue with oxygen and nutrients and to remove its metabolic wastes, blood vessels penetrating the tissue are formed. Multiple mechanisms are involved ...
Dominik Szczerba, Gábor Székely
CIA
2003
Springer
15 years 3 months ago
A Framework for the Social Description of Resources in Open Environments
Abstract. The description of public resources such as web site contents, web services or data files in open peer-to-peer networks using some formal framework like RDF usually re...
Matthias Nickles, Gerhard Weiß
CIKM
2009
Springer
15 years 2 months ago
Scalable continuous range monitoring of moving objects in symbolic indoor space
Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., s...
Bin Yang 0002, Hua Lu, Christian S. Jensen