Sciweavers

5744 search results - page 1147 / 1149
» System level design, a VHDL based approach
Sort
View
110
Voted
ECAI
2006
Springer
15 years 1 months ago
Agents with Anticipatory Behaviors: To Be Cautious in a Risky Environment
This work presents some anticipatory mechanisms in an agent architecture, modeling affective behaviours as effects of surprise. Through experiment discussion, the advantages of bec...
Cristiano Castelfranchi, Rino Falcone, Michele Piu...
ASPLOS
2006
ACM
14 years 11 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
97
Voted
KRMED
2008
14 years 11 months ago
Essential SNOMED: Simplifying SNOMED-CT and supporting Integration with Health Information Models
SNOMED CT (SCT) has been designed and implemented in an era when health computer systems generally required terminology representations in the form of singular precoordinated conc...
Peter MacIsaac, Donald Walker, Rachel L. Richesson...
FLAIRS
2001
14 years 11 months ago
Autonomy for SOHO Ground Operations
/Background The SOLAR and HELIOSPHERIC OBSERVATORY (SOHO) project [SOHO Web Page] is being carried out by the European Space Agency (ESA) and the US National Aeronautics and Space ...
Walt Truszkowski, Nick Netreba, Don Ginn, Sanda Ma...
76
Voted
CN
2008
100views more  CN 2008»
14 years 9 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
« Prev « First page 1147 / 1149 Last » Next »