Sciweavers

6796 search results - page 1306 / 1360
» Java for Embedded Systems
Sort
View
130
Voted
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 2 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
JUCS
2006
112views more  JUCS 2006»
15 years 2 months ago
A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip
Abstract: Advances in technology now make it possible to integrate hundreds of cores (e.g. general or special purpose processors, embedded memories, application specific components...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi
116
Voted
CN
2002
77views more  CN 2002»
15 years 2 months ago
Architecture of a Web server accelerator
We describe the design, implementation and performance of a high-performance Web server accelerator which runs on an embedded operating system and improves Web server performance ...
Junehwa Song, Arun Iyengar, Eric Levy-Abegnoli, Da...
BC
1998
77views more  BC 1998»
15 years 1 months ago
Nonlinear analysis of epileptic activity in rabbit neocortex
Abstract. We report on the nonlinear analysis of electroencephalogram (EEG) recordings in the rabbit visual cortex. Epileptic seizures were induced by local penicillin application ...
J. Sarnthein, Henry D. I. Abarbanel, H. Pockberger
TOG
2002
156views more  TOG 2002»
15 years 1 months ago
Chromium: a stream-processing framework for interactive rendering on clusters
We describe Chromium, a system for manipulating streams of graphics API commands on clusters of workstations. Chromium's stream filters can be arranged to create sort-first a...
Greg Humphreys, Mike Houston, Ren Ng, Randall Fran...
« Prev « First page 1306 / 1360 Last » Next »