Sciweavers

126 search results - page 6 / 26
» Soft Typing
Sort
View
ERSA
2009
109views Hardware» more  ERSA 2009»
14 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
AI
2006
Springer
14 years 9 months ago
The complexity of soft constraint satisfaction
Over the past few years there has been considerable progress in methods to systematically analyse the complexity of constraint satisfaction problems with specified constraint type...
David A. Cohen, Martin C. Cooper, Peter Jeavons, A...
TOG
2012
181views Communications» more  TOG 2012»
13 years 1 days ago
Soft body locomotion
We present a physically-based system to simulate and control the locomotion of soft body characters without skeletons. We use the finite element method to simulate the deformatio...
Jie Tan, Greg Turk, C. Karen Liu
53
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Multiple Antenna Assisted Hard Versus Soft Decoding-and-Forwarding for Network Coding Aided Relaying Systems
— In this paper, we propose two types of new decoding algorithms for a network coding aided relaying (NCR) system, which adopts multiple antennas at both the transmitter and rece...
Kyungchun Lee, Lajos Hanzo
MSWIM
2006
ACM
15 years 3 months ago
Analysis of soft handover measurements in 3G network
A neural network based clustering method for the analysis of soft handovers in 3G network is introduced. The method is highly visual and it could be utilized in explorative analys...
Kimmo Raivio