Sciweavers

1818 search results - page 228 / 364
» How users use access control
Sort
View
ASPDAC
2001
ACM
112views Hardware» more  ASPDAC 2001»
15 years 8 months ago
Parameterized MAC unit implementation
Ethernet communication devices, such as adapter, hub, bridge and switch, all follow IEEE 802.3 standard protocol. We have designed and implemented an integrated 10/100 Mbps Etherne...
Ming-Chih Chen, Ing-Jer Huang, Chung-Ho Chen
HUC
2004
Springer
15 years 9 months ago
An Audio-Based Personal Memory Aid
We are developing a wearable device that attempts to alleviate some everyday memory problems. The “memory prosthesis” records audio and contextual information from conversation...
Sunil Vemuri, Chris Schmandt, Walter Bender, Stefa...
FPL
2001
Springer
136views Hardware» more  FPL 2001»
15 years 9 months ago
Building Asynchronous Circuits with JBits
Asynchronous logic design has been around for decades. However, only recently has it gained any commercial success. Research has focused on a wide variety of uses, from microproces...
Eric Keller
IROS
2006
IEEE
136views Robotics» more  IROS 2006»
15 years 10 months ago
Dynamical Systems Approach for the Autonomous Avoidance of Obstacles and Joint-limits for an Redundant Robot Arm
— We extend the attractor dynamics approach to generate goal-directed movement of a redundant, anthropomorphic arm while avoiding dynamic obstacles and respecting joint limits. T...
Ioannis Iossifidis, Gregor Schöner
JNW
2007
102views more  JNW 2007»
15 years 4 months ago
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments
Abstract— A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Mana...
Lukasz Opyrchal, Atul Prakash, Amit Agrawal