Sciweavers

5234 search results - page 190 / 1047
» Method Components - Rationale Revealed
Sort
View
113
Voted
ISCAS
2003
IEEE
126views Hardware» more  ISCAS 2003»
15 years 8 months ago
Low power block based FIR filtering cores
— The authors present a number of complete cores which are specially tailored for the low power implementation of FIR filters executed using block processing. The paper reveals t...
Ahmet T. Erdogan, Tughrul Arslan
WORDS
2003
IEEE
15 years 8 months ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 7 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...
ADVCS
2004
65views more  ADVCS 2004»
15 years 3 months ago
Multiscale Complexity/Entropy
We discuss the role of scale dependence of entropy/complexity and its relationship to component interdependence. The complexity as a function of scale of observation is expressed ...
Y. Bar-Yam
127
Voted
AI
2004
Springer
15 years 3 months ago
The representation of planning strategies
sis of strategies, recognizable abstract patterns of planned behavior, highlights the difference between the assumptions that people make about their own planning processes and th...
Andrew S. Gordon