Sciweavers

708 search results - page 86 / 142
» Timing closure: the solution and its problems
Sort
View
CSE
2009
IEEE
15 years 4 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
IPPS
2007
IEEE
15 years 4 months ago
Reconfigurable Architecture for Biological Sequence Comparison in Reduced Memory Space
DNA sequence alignment is a very important problem in bioinformatics. The algorithm proposed by Smith-Waterman (SW) is an exact method that obtains optimal local alignments in qua...
Azzedine Boukerche, Jan Mendonca Correa, Alba Cris...
IROS
2006
IEEE
113views Robotics» more  IROS 2006»
15 years 4 months ago
Localization of avalanche victims using robocentric SLAM
— A person buried by a snow avalanche can be found by measuring the magnetic field generated by an avalanche beacon or ARVA carried by the victim. However, the signals received ...
Pedro Pinies, Juan D. Tardós, José N...
CG
2006
Springer
14 years 10 months ago
Approximate collision response using closest feature maps
In this paper we consider the novel idea of closest feature maps (CFMs) applied to refinable collision response in order to address the potential issues and problems associated wi...
Thanh Giang, Carol O'Sullivan
JCM
2006
169views more  JCM 2006»
14 years 10 months ago
Trends in Middleware for Mobile Ad Hoc Networks
The use of middleware has extended from simply facilitating applications' communication to a broad set of services supporting a huge spectrum of networked and distributed comp...
Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed