Sciweavers

23988 search results - page 4520 / 4798
» Social Network Computing
Sort
View
ASPDAC
2006
ACM
133views Hardware» more  ASPDAC 2006»
15 years 10 months ago
High-level architecture exploration for MPEG4 encoder with custom parameters
Abstract - this paper proposes the use of a high-level architecture exploration method for different MPEG4 video encoders using different customization parameters. The targeted arc...
Marius Bonaciu, Aimen Bouchhima, Mohamed-Wassim Yo...
ASPDAC
2006
ACM
88views Hardware» more  ASPDAC 2006»
15 years 10 months ago
Equivalent circuit modeling of guard ring structures for evaluation of substrate crosstalk isolation
— A substrate-coupling equivalent circuit can be derived for an arbitrary guard ring test structure by way of F-matrix computation. The derived netlist represents a unified impe...
Daisuke Kosaka, Makoto Nagata
119
Voted
IMC
2006
ACM
15 years 10 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
IUI
2006
ACM
15 years 10 months ago
A goal-oriented interface to consumer electronics using planning and commonsense reasoning
We are reaching a crisis with design of user interfaces for consumer electronics. Flashing 12:00 time indicators, push-andhold buttons, and interminable modes and menus are all sy...
Henry Lieberman, José H. Espinosa
MOBICOM
2006
ACM
15 years 10 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal
« Prev « First page 4520 / 4798 Last » Next »