Sciweavers

8468 search results - page 1368 / 1694
» The Technology of Data Stashing
Sort
View
DFT
2007
IEEE
103views VLSI» more  DFT 2007»
15 years 5 months ago
Reliable Network-on-Chip Using a Low Cost Unequal Error Protection Code
The network-on-chip (NoC) paradigm is seen as a way of facilitating the integration of a large number of computational and storage blocks on a chip to meet several performance and...
Avijit Dutta, Nur A. Touba
DSN
2007
IEEE
15 years 5 months ago
Dependability Assessment of Grid Middleware
Dependability is a key factor in any software system due to the potential costs in both time and money a failure may cause. Given the complexity of Grid applications that rely on ...
Nik Looker, Jie Xu
EUROMICRO
2007
IEEE
15 years 5 months ago
SensBution: A Rule-Based Peer-to-Peer Approach for Sensor-Based Infrastructures
Ubiquitous environments facilitate the fast and easy access to users’ physical environments. Ubiquitous environments typically capture users’ presence and activities in a room...
Tom Gross, Thilo Paul-Stueve, Tsvetomira Palakarsk...
FBIT
2007
IEEE
15 years 5 months ago
Evaluation of a Dominance-Based Rough Set Approach to Interface Design
This paper explores refinements to methods used in a procedure being developed by the authors to personalize user interfaces for online shopping support tools. In the authors’ ...
Timothy Maciag, Daryl H. Hepting, Robert J. Hilder...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 5 months ago
Channel Protection with Real-Time and In-Service Performance Monitoring for Next Generation Secure WDM Networks
Advanced optical networks deploy wavelength division multiplexing technology to transport an unprecedented amount of information per fiber. Each optical channel transports informat...
Stamatios V. Kartalopoulos
« Prev « First page 1368 / 1694 Last » Next »