Sciweavers

2674 search results - page 157 / 535
» Implementation issues for an interactive evolutionary comput...
Sort
View
126
Voted
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 10 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
FLAIRS
2004
15 years 5 months ago
An Active Architecture for Managing Events in Pervasive Computing Environments
Many dramatizations have depicted a fully automated home living environment, where actions and events are understood or even anticipated. While the realization of such environment...
Edwin Wong, Lisa J. Burnell, Charles Hannon
IUI
2003
ACM
15 years 9 months ago
Interaction tactics for socially intelligent pedagogical agents
Guidebots, or animated pedagogical agents, can enhance interactive learning environments by promoting deeper learning and improve the learner's subjective experience. Guidebo...
W. Lewis Johnson
SPAA
2003
ACM
15 years 9 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
110
Voted
DAC
2005
ACM
16 years 5 months ago
Locality-conscious workload assignment for array-based computations in MPSOC architectures
While the past research discussed several advantages of multiprocessor-system-on-a-chip (MPSOC) architectures from both area utilization and design verification perspectives over ...
Feihui Li, Mahmut T. Kandemir