Sciweavers

10689 search results - page 1998 / 2138
» How informances can be used in design ethnography
Sort
View
101
Voted
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
15 years 4 days ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
ICISC
2007
134views Cryptology» more  ICISC 2007»
14 years 11 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
IADIS
2003
14 years 11 months ago
A Web-Based Collaboration System for Geographically Distributed Medical Professionals
This paper is about a web-based system for collaboration and sharing of information among medical professionals. The system, originally targeted for ophthalmologists, has a generi...
Tatjana M. Burkow, Kristian Fossen, Line Lundvoll ...
117
Voted
IKE
2003
14 years 11 months ago
A Tree-Based inverted File for Fast Ranked-Document Retrieval
Inverted files are widely used to index documents in large-scale information retrieval systems. An inverted file consists of posting lists, which can be stored in either a documen...
Wann-Yun Shieh, Tien-Fu Chen, Chung-Ping Chung
82
Voted
ASPDAC
2008
ACM
106views Hardware» more  ASPDAC 2008»
14 years 11 months ago
Verifying full-custom multipliers by Boolean equivalence checking and an arithmetic bit level proof
—In this paper we describe a practical methodology to formally verify highly optimized, industrial multipliers. We a multiplier description language which abstracts from low-leve...
Udo Krautz, Markus Wedler, Wolfgang Kunz, Kai Webe...
« Prev « First page 1998 / 2138 Last » Next »