Sciweavers

8503 search results - page 1388 / 1701
» Secure Software Architectures
Sort
View
MM
1993
ACM
126views Multimedia» more  MM 1993»
15 years 4 months ago
Phoneshell: The Telephone as Computer Terminal
This paper describes Phoneshell, a telephone based application providing remote voice access to personal desktop databases such as voice mail, email, calendar, and rolodex. Severa...
Chris Schmandt
DNA
2007
Springer
106views Bioinformatics» more  DNA 2007»
15 years 4 months ago
Hardware Acceleration for Thermodynamic Constrained DNA Code Generation
Reliable DNA computing requires a large pool of oligonucleotides that do not produce cross-hybridize. In this paper, we present a transformed algorithm to calculate the maximum wei...
Qinru Qiu, Prakash Mukre, Morgan Bishop, Daniel J....
FCCM
2009
IEEE
316views VLSI» more  FCCM 2009»
15 years 4 months ago
An FPGA Implementation for Solving Least Square Problem
This paper proposes a high performance least square solver on FPGAs using the Cholesky decomposition method. Our design can be realized by iteratively adopting a single triangular...
Depeng Yang, Gregory D. Peterson, Husheng Li, Junq...
FPL
2009
Springer
132views Hardware» more  FPL 2009»
15 years 4 months ago
Binary Synthesis with multiple memory banks targeting array references
High-Level Synthesis (HLS) is the field of transforming a high-level programming language, such as C, into a register transfer level(RTL) description of the design. In HLS, Binary...
Yosi Ben-Asher, Nadav Rotem
BSN
2006
IEEE
15 years 4 months ago
eWatch: A Wearable Sensor and Notification Platform
The eWatch is a wearable sensing, notification, and computing platform built into a wrist watch form factor making it highly available, instantly viewable, ideally located for sen...
Uwe Maurer, Anthony Rowe, Asim Smailagic, Daniel P...
« Prev « First page 1388 / 1701 Last » Next »