Sciweavers

2663 search results - page 179 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
JCM
2007
115views more  JCM 2007»
14 years 10 months ago
eEPC: an EPCglobal-compliant Embedded Architecture for RFID-based Solutions
— Radio Frequency Identification (RFID) technology has a lot of potential to improve visibility across the supply chain and automate the business processes. This paper describes ...
Franco Fummi, Giovanni Perbellini
101
Voted
FUNGAMES
2010
14 years 9 months ago
panOULU conqueror: pervasive location-aware multiplayer game for city-wide wireless network
We present the design, implementation and evaluation of a novel pervasive location-aware multiplayer game. In the game teams of players try to score points by conquering the real-...
Juha Tiensyrjä, Timo Ojala, Toni Hakanen, Oss...
FPGA
2004
ACM
120views FPGA» more  FPGA 2004»
15 years 3 months ago
Flexibility measurement of domain-specific reconfigurable hardware
Traditional metrics used to compare hardware designs include area, performance, and power. However, these metrics do not form a complete evaluation of reconfigurable hardware. For...
Katherine Compton, Scott Hauck
94
Voted
ASPDAC
2010
ACM
152views Hardware» more  ASPDAC 2010»
14 years 8 months ago
Slack redistribution for graceful degradation under voltage overscaling
Modern digital IC designs have a critical operating point, or "wall of slack", that limits voltage scaling. Even with an errortolerance mechanism, scaling voltage below a...
Andrew B. Kahng, Seokhyeong Kang, Rakesh Kumar, Jo...
ISSTA
2012
ACM
13 years 28 days ago
Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say
A static analysis design is sufficient if it can prove the property of interest with an acceptable number of false alarms. Ultimately, the only way to confirm that an analysis d...
Devin Coughlin, Bor-Yuh Evan Chang, Amer Diwan, Je...