Sciweavers

8009 search results - page 49 / 1602
» cans 2005
Sort
View
IPPS
2005
IEEE
15 years 5 months ago
A Category Overlay Infrastructure for Peer-to-Peer Content Search
For a Peer-to-Peer (P2P) system which contains huge amount of data, an efficient content search technique is definitely necessary. In this paper, we present a novel category overl...
Xin Liu, Jun Wang, Son T. Vuong
ISCAS
2005
IEEE
118views Hardware» more  ISCAS 2005»
15 years 5 months ago
A robust background calibration technique for switched-capacitor pipelined ADCs
— This work presents a robust background calibration scheme for switched-capacitor (SC) pipelined analog-to-digital converters. A SC multiplying digital-to-analog converter (MDAC...
Jen-Lin Fan, Jieh-Tsorng Wu
ARGMAS
2005
Springer
15 years 5 months ago
A Protocol for Arguing About Rejections in Negotiation
One form of argument-based negotiation is when agents argue about why an offer was rejected. If an agent can state a reason for a rejection of an offer, the negotiation process m...
Jelle van Veenen, Henry Prakken
ICCS
2005
Springer
15 years 5 months ago
A Comparative Study of Acceleration Techniques for Geometric Visualization
Abstract. Nowadays computer graphics hardware presents a series of characteristics, such as AGP memory, vertex cache, etc., that can be used for real-time rendering. The aim of thi...
Pascual Castelló, J. Francisco Ramos, Migue...
IVA
2005
Springer
15 years 5 months ago
Maintaining the Identity of Dynamically Embodied Agents
Abstract. Virtual agents are traditionally constrained in their embodiment, as they are restricted to one form of body. We propose allowing them to change their embodiment in order...
Alan N. Martin, Gregory M. P. O'Hare, Brian R. Duf...