Sciweavers

2047 search results - page 189 / 410
» Pervasive Computing on Active Networks
Sort
View
IJCNN
2008
IEEE
15 years 11 months ago
Kernel methods for fMRI pattern prediction
Abstract— In this paper, we present an effective computational approach for learning patterns of brain activity from the fMRI data. The procedure involved correcting motion artif...
Yizhao Ni, Carlton Chu, Craig J. Saunders, John As...
ICCAD
1996
IEEE
131views Hardware» more  ICCAD 1996»
15 years 8 months ago
Multi-level logic optimization for low power using local logic transformations
In this paper we present an ecient technique to reduce the switching activity in a CMOS combinational logic network based on local logic transformations. These transformations con...
Qi Wang, Sarma B. K. Vrudhula
PERCOM
2006
ACM
16 years 4 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
CSE
2009
IEEE
15 years 11 months ago
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
André Luiz B. Rodrigues, Izabela C. Gomes, ...
DIGRA
2005
Springer
15 years 10 months ago
Designing Goals for Online Role-Players
The increasing popularity of persistent worlds and the predicted rise of pervasive gaming, both having a strong inherent potential for role-playing, stress a classical challenge o...
Markus Montola