Sciweavers

5922 search results - page 1051 / 1185
» Navigability of Complex Networks
Sort
View
107
Voted
AUIC
2004
IEEE
15 years 4 months ago
Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?
In the not too distant future Intelligent Creatures (robots, smart devices, smart vehicles, smart buildings, etc) will share the everyday living environment of human beings. It is...
Brendan Bartlett, Vladimir Estivill-Castro, Stuart...
87
Voted
BIBE
2004
IEEE
15 years 4 months ago
Identifying the Combination of Genetic Factors that Determine Susceptibility to Cervical Cancer
Cervical cancer is common among women all over the world. Although infection with high-risk types of human papillomavirus (HPV) has been identified as the primary cause of cervical...
Jorng-Tzong Horng, Kai-Chih Hu, Li-Cheng Wu, Hsien...
99
Voted
DATE
2004
IEEE
158views Hardware» more  DATE 2004»
15 years 4 months ago
Bandwidth-Constrained Mapping of Cores onto NoC Architectures
We address the design of complex monolithic systems, where processing cores generate and consume a varying and large amount of data, thus bringing the communication links to the e...
Srinivasan Murali, Giovanni De Micheli
DATE
2004
IEEE
126views Hardware» more  DATE 2004»
15 years 4 months ago
Generalized Latency-Insensitive Systems for Single-Clock and Multi-Clock Architectures
Latency-insensitive systems were recently proposed by Carloni et al. as a correct-by-construction methodology for single-clock system-on-a-chip (SoC) design using predesigned IP b...
Montek Singh, Michael Theobald
CCS
2006
ACM
15 years 4 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
« Prev « First page 1051 / 1185 Last » Next »