Sciweavers

3736 search results - page 695 / 748
» Hand-Writing Program Generator Generators
Sort
View
DATE
2009
IEEE
131views Hardware» more  DATE 2009»
15 years 5 months ago
Optimizations of an application-level protocol for enhanced dependability in FlexRay
FlexRay [9] is an automotive standard for high-speed and reliable communication that is being widely deployed for next generation cars. The protocol has powerful errordetection me...
Wenchao Li, Marco Di Natale, Wei Zheng, Paolo Gius...
93
Voted
CAE
2007
15 years 4 months ago
Celtic Knots Colorization based on Color Harmony Principles
This paper proposes two simple and powerful algorithms to automatically paint Celtic knots with aesthetic colors. The shape of the knot is generated from its dual graph as present...
Caroline Larboulette
WSC
2008
15 years 4 months ago
A simulator to improve waiting times at a Medical Imaging Center
Medical Imaging Centers (MIC) are critical units in every hospital or medical center because they are an important step in generating a patient's diagnostic. This paper shows...
Francisco J. Ramis, Felipe F. Baesler, Edgar Berho...
135
Voted
ATAL
2008
Springer
15 years 4 months ago
Comparing winner determination algorithms for mixed multi-unit combinatorial auctions
Mixed multi-unit combinatorial auctions are combinatorial auctions in which the auctioneer and the bidders negotiate over transformations rather than over simple goods. By proposi...
Brammert Ottens, Ulle Endriss
106
Voted
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 4 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...