Sciweavers

2035 search results - page 299 / 407
» Working memory
Sort
View
ICW
2005
IEEE
209views Communications» more  ICW 2005»
15 years 8 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
IEEEICCI
2005
IEEE
15 years 8 months ago
A brain-like computer for cognitive software applications: the Ersatz Brain project
We want to design a suitable computer for the efficient execution of the software now being developed that will display human-like cognitive abilities. Examples of these potential...
J. A. Anderson
ISCA
2005
IEEE
118views Hardware» more  ISCA 2005»
15 years 8 months ago
Continuous Optimization
This paper presents a hardware-based dynamic optimizer that continuously optimizes an application’s instruction stream. In continuous optimization, dataflow optimizations are p...
Brian Fahs, Todd M. Rafacz, Sanjay J. Patel, Steve...
LAWEB
2005
IEEE
15 years 8 months ago
Devices Descriptions for Context-Based Content Adaptation
Nowadays, networks can be accessed by multiple devices with different characteristics. Some of these characteristics such as low processing power and memory capacity restrict the ...
Robson Eisinger, Marcelo G. Manzato, Rudinei Goula...
MICRO
2005
IEEE
125views Hardware» more  MICRO 2005»
15 years 8 months ago
Improving Region Selection in Dynamic Optimization Systems
The performance of a dynamic optimization system depends heavily on the code it selects to optimize. Many current systems follow the design of HP Dynamo and select a single interp...
David Hiniker, Kim M. Hazelwood, Michael D. Smith