Sciweavers

3771 search results - page 486 / 755
» Subobject Transformation Systems
Sort
View
EDOC
2002
IEEE
15 years 9 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
GLVLSI
2002
IEEE
105views VLSI» more  GLVLSI 2002»
15 years 9 months ago
Board-level multiterminal net assignment
The paper presents a satisfiability-based method for solving the board-level multiterminal net routing problem in Clos-Folded FPGA based logic emulation systems. The approach tran...
Xiaoyu Song, William N. N. Hung, Alan Mishchenko, ...
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
15 years 9 months ago
Ubiquitous Computing: Omnipresent Technology in Support of Network Centric Warfare
The U.S. military is in the midst of a transformation. While business leaders moved quickly to put computing power in the hands of individuals, the military establishment has been...
Mark Adkins, John Kruse, Robert Younger
CASES
2009
ACM
15 years 9 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
ICANN
2009
Springer
15 years 9 months ago
Learning from Examples to Generalize over Pose and Illumination
We present a neural system that recognizes faces under strong variations in pose and illumination. The generalization is learnt completely on the basis of examples of a subset of p...
Marco K. Müller, Rolf P. Würtz