Sciweavers

2200 search results - page 326 / 440
» Hop Integrity in Computer Networks
Sort
View
153
Voted
DOA
2000
159views more  DOA 2000»
15 years 4 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
153
Voted
CSCWD
2009
Springer
15 years 1 months ago
The analysis and development of Taiwan's industrial logistics hubs
With the trend of globalization, enterprises require to extend their logistics scope from domestic to international, integrate logistics networks, and improve the agility and effi...
Charles V. Trappey, Amy J. C. Trappey, Gilbert Y. ...
ERSA
2009
147views Hardware» more  ERSA 2009»
15 years 1 months ago
Fault Avoidance in Medium-Grain Reconfigurable Hardware Architectures
Medium-grain reconfigurable hardware (MGRH) architectures represent a hybrid between the versatility of a field programmable gate array (FPGA) and the computational power of a cust...
Kylan Robinson, José G. Delgado-Frias
CVPR
2012
IEEE
13 years 5 months ago
A flow model for joint action recognition and identity maintenance
We propose a framework that performs action recognition and identity maintenance of multiple targets simultaneously. Instead of first establishing tracks using an appearance mode...
Sameh Khamis, Vlad I. Morariu, Larry S. Davis
CASES
2006
ACM
15 years 9 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks