Sciweavers

8503 search results - page 1323 / 1701
» Secure Software Architectures
Sort
View
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
15 years 8 months ago
Value based Requirements Creation for Electronic Commerce Applications
Electronic commerce applications have special features compared to conventional information systems. First, because electronic commerce usually involves yet nonexisting business a...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
ICCAD
2000
IEEE
115views Hardware» more  ICCAD 2000»
15 years 8 months ago
Challenges and Opportunities in Broadband and Wireless Communication Designs
Communication designs form the fastest growing segment of the semiconductor market. Both network processors and wireless chipsets have been attracting a great deal of research att...
Jan M. Rabaey, Miodrag Potkonjak, Farinaz Koushanf...
127
Voted
DAC
1999
ACM
15 years 8 months ago
Common-Case Computation: A High-Level Technique for Power and Performance Optimization
This paper presents a design methodology, called common-case computation (CCC), and new design automation algorithms for optimizing power consumption or performance. The proposed ...
Ganesh Lakshminarayana, Anand Raghunathan, Kamal S...
132
Voted
HUC
1999
Springer
15 years 8 months ago
Advanced Interaction in Context
Mobile information appliances are increasingly used in numerous different situations and locations, setting new requirements to their interaction methods. When the user's situ...
Albrecht Schmidt, Kofi Asante Aidoo, Antti Takaluo...
136
Voted
SIGGRAPH
1998
ACM
15 years 8 months ago
The Clipmap: A Virtual Mipmap
We describe the clipmap, a dynamic texture representation that efficiently caches textures of arbitrarily large size in a finite amount of physical memory for rendering at real-...
Christopher C. Tanner, Christopher J. Migdal, Mich...
« Prev « First page 1323 / 1701 Last » Next »