Sciweavers

3516 search results - page 484 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SIGIR
2005
ACM
15 years 10 months ago
Modeling task-genre relationships for IR in the workplace
Context influences the search process, but to date research has not definitively identified which aspects of context are the most influential for information retrieval, and thus a...
Luanne Freund, Elaine G. Toms, Charles L. A. Clark...
FPL
2005
Springer
98views Hardware» more  FPL 2005»
15 years 10 months ago
Using DSP Blocks For ROM Replacement: A Novel Synthesis Flow
This paper describes a method based on polynomial approximation for transferring ROM resources used in FPGA designs to multiplication and addition operations. The technique can be...
Gareth W. Morris, George A. Constantinides, Peter ...
ASAP
2007
IEEE
153views Hardware» more  ASAP 2007»
15 years 4 months ago
Performance Evaluation of Adaptive Routing Algorithms for achieving Fault Tolerance in NoC Fabrics
Commercial designs are integrating from 10 to 100 embedded functional and storage blocks in a single system on chip (SoC) currently, and the number is likely to increase significa...
Haibo Zhu, Partha Pratim Pande, Cristian Grecu
CHI
2000
ACM
15 years 9 months ago
The cubic mouse: a new device for three-dimensional input
We have developed a new input device that allows users to intuitively specify three-dimensional coordinates in graphics applications. The device consists of a cubeshaped box with ...
Bernd Fröhlich, John Plate
BMCBI
2005
98views more  BMCBI 2005»
15 years 4 months ago
Iterative approach to model identification of biological networks
Background: Recent advances in molecular biology techniques provide an opportunity for developing detailed mathematical models of biological processes. An iterative scheme is intr...
Kapil G. Gadkar, Rudiyanto Gunawan, Francis J. Doy...