Sciweavers

6618 search results - page 1248 / 1324
» Information and Communication Technologies for Development
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 3 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
DAC
2006
ACM
15 years 3 months ago
Circuits for energy harvesting sensor signal processing
duce system weight and volume, increase operating lifetime, The recent explosion in capability of embedded and portable decrease maintenance costs, and open new frontiers for inele...
Rajeevan Amirtharajah, Justin Wenck, Jamie Collier...
ICALT
2005
IEEE
15 years 3 months ago
ActiveTutor
In this paper we present an architecture dedicated to an intelligently assisted educational tool which integrates within a unified framework software rational agents both at the m...
Jean Pierre Fournier
ISCAS
2005
IEEE
171views Hardware» more  ISCAS 2005»
15 years 3 months ago
Image transmission over IEEE 802.15.4 and ZigBee networks
An image sensor network platform is developed for testing transmission of images over ZigBee networks that support multi-hopping. The ZigBee is a low rate and low power networking...
G. Pekhteryev, Zafer Sahinoglu, Philip V. Orlik, G...
MICRO
2005
IEEE
130views Hardware» more  MICRO 2005»
15 years 3 months ago
Exploiting Vector Parallelism in Software Pipelined Loops
An emerging trend in processor design is the addition of short vector instructions to general-purpose and embedded ISAs. Frequently, these extensions are employed using traditiona...
Samuel Larsen, Rodric M. Rabbah, Saman P. Amarasin...
« Prev « First page 1248 / 1324 Last » Next »