Sciweavers

2555 search results - page 430 / 511
» Quantifiers and Working Memory
Sort
View
128
Voted
ITIIS
2008
128views more  ITIIS 2008»
15 years 3 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
106
Voted
CONCURRENCY
2007
75views more  CONCURRENCY 2007»
15 years 3 months ago
A distributed packed storage for large dense parallel in-core calculations
We propose in this paper a distributed packed storage format that exploits the symmetry or the triangular structure of a dense matrix. This format stores only half of the matrix w...
Marc Baboulin, Luc Giraud, Serge Gratton, Julien L...
116
Voted
JCC
2008
92views more  JCC 2008»
15 years 3 months ago
Two-electron integral evaluation on the graphics processor unit
: We propose the algorithm to evaluate the Coulomb potential in the ab initio density functional calculation on the graphics processor unit (GPU). The numerical accuracy required f...
Koji Yasuda
117
Voted
JMM2
2008
102views more  JMM2 2008»
15 years 3 months ago
Logical Mapping: An Intermedia Synchronization Model for Multimedia Distributed Systems
The preservation of temporal dependencies among different media data, such as text, still images, video and audio, and which have simultaneous distributed sources as origin, is an ...
Saul Pomares Hernandez, Luis A. Morales Rosales, J...
124
Voted
JOLLI
2008
103views more  JOLLI 2008»
15 years 3 months ago
Age Differences in Adults' Use of Referring Expressions
The aim of this article is to investigate whether choosing the appropriate referring expression requires taking into account the hearer's perspective, as is predicted under so...
Petra Hendriks, Christina Englert, Ellis Wubs, Joh...