Sciweavers

5722 search results - page 990 / 1145
» Security Function Interactions
Sort
View
121
Voted
CASES
2009
ACM
15 years 7 months ago
Exploiting residue number system for power-efficient digital signal processing in embedded processors
2's complement number system imposes a fundamental limitation on the power and performance of arithmetic circuits, due to the fundamental need of cross-datapath carry propaga...
Rooju Chokshi, Krzysztof S. Berezowski, Aviral Shr...
120
Voted
CANDC
2007
ACM
15 years 7 months ago
Performative roles of materiality for collective creativity
This paper seeks to develop a better understanding of the contribution of materiality for creativity in collaborative settings, exploring the ways in which it provides resources f...
Giulio Jacucci, Ina Wagner
CEC
2007
IEEE
15 years 7 months ago
Evolving hypernetwork classifiers for microRNA expression profile analysis
Abstract-- High-throughput microarrays inform us on different outlooks of the molecular mechanisms underlying the function of cells and organisms. While computational analysis for ...
Sun Kim, Soo-Jin Kim, Byoung-Tak Zhang
133
Voted
ENTER
2007
Springer
15 years 7 months ago
Developing Web-Based Tourist Information Tools Using Google Map
This paper reports an explanatory study of using Google Map API to develop two destinationspecific tourist information tools: a handheld tour guide and an online trip planner for ...
Bing Pan, John C. Crotts, Brian Muller
ICDCS
2010
IEEE
15 years 7 months ago
CONTRACT: Incorporating Coordination into the IP Network Control Plane
—This paper presents the CONTRACT framework to address a fundamental deficiency of the IP network control plane, namely the lack of coordination between an IGP and other control...
Zheng Cai, Florin Dinu, Jie Zheng, Alan L. Cox, T....