Sciweavers

13397 search results - page 2261 / 2680
» From Static Distributed Systems to Dynamic Systems
Sort
View
AUIC
2004
IEEE
15 years 8 months ago
Wearable Microphone Array as User Interface
We are at present enabled with machine-empowered technologies. The future is certainly looking towards human-empowered technologies, which should enable mobile user with natural w...
Yong Xu, Mingjiang Yang, Yanxin Yan, Jianfeng Chen
EUROMICRO
2004
IEEE
15 years 8 months ago
Evaluation of Component Technologies with Respect to Industrial Requirements
We compare existing component technologies for embedded systems with respect to industrial requirements. The requirements are collected from the vehicular industry, but our findin...
Anders Möller, Mikael Åkerholm, Johan F...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 8 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
GECCO
2006
Springer
222views Optimization» more  GECCO 2006»
15 years 8 months ago
High-order punishment and the evolution of cooperation
The Prisoner's Dilemma and the Public Goods Game are models to study mechanisms leading to the evolution of cooperation. From a simplified rational and egoistic perspective t...
Bastian Baranski, Thomas Bartz-Beielstein, Rü...
ATS
2001
IEEE
126views Hardware» more  ATS 2001»
15 years 8 months ago
Design of an Optimal Test Access Architecture Using a Genetic Algorithm
Test access is a major problem for core-based systemon-chip (SOC) designs. Since cores in an SOC are not directly accessible via chip inputs and outputs, special access mechanisms...
Zahra Sadat Ebadi, André Ivanov
« Prev « First page 2261 / 2680 Last » Next »