Sciweavers

6300 search results - page 1043 / 1260
» We have it easy, but do we have it right
Sort
View
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 7 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 7 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
ICDE
2005
IEEE
115views Database» more  ICDE 2005»
15 years 7 months ago
Provenance-Aware Sensor Data Storage
Abstract— Sensor network data has both historical and realtime value. Making historical sensor data useful, in particular, requires storage, naming, and indexing. Sensor data pre...
Jonathan Ledlie, Chaki Ng, David A. Holland
89
Voted
ICRA
2005
IEEE
144views Robotics» more  ICRA 2005»
15 years 7 months ago
A Miniature Mobile Robot With a Color Stereo Camera System for Swarm Robotics Research
— In swarm robotics research, instead of using large size robots, it is often desirable to have multiple small size robots for saving valuable work space and making the maintaina...
Janne Haverinen, Mikko Parpala, Juha Röning
SACMAT
2005
ACM
15 years 7 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
« Prev « First page 1043 / 1260 Last » Next »