Results 21 - 30
of
28,267
DAGON: Technology Binding and Local Optimization by DAG
- Matching”, Proc. ACM/IEEE Design Automation Conference
, 1987
"... Technology binding is the process of mapping a technology independent description of a circuit into a particular tech-nology. This paper outlines a formalism of this problem and offers a solution to the problem in terms of matching patterns, describing technology specific cells and optimiza-tions, a ..."
Abstract
-
Cited by 155 (1 self)
- Add to MetaCart
Technology binding is the process of mapping a technology independent description of a circuit into a particular tech-nology. This paper outlines a formalism of this problem and offers a solution to the problem in terms of matching patterns, describing technology specific cells and optimiza-tions
SOME ASYMPTOTIC METHODS FOR STRONGLY NONLINEAR EQUATIONS
, 2006
"... This paper features a survey of some recent developments in asymptotic techniques, which are valid not only for weakly nonlinear equations, but also for strongly ones. Further, the obtained approximate analytical solutions are valid for the whole solution domain. The limitations of traditional pertu ..."
Abstract
-
Cited by 185 (6 self)
- Add to MetaCart
This paper features a survey of some recent developments in asymptotic techniques, which are valid not only for weakly nonlinear equations, but also for strongly ones. Further, the obtained approximate analytical solutions are valid for the whole solution domain. The limitations of traditional
Dealing with Mobility: Understanding access anytime, anywhere
"... The rapid and accelerating move towards the adoption and use of mobile technologies has increasingly provided people and organisations with the ability to work away from the office and on the move. The new ways of working afforded by these technologies are often characterised in terms of the access ..."
Abstract
-
Cited by 179 (7 self)
- Add to MetaCart
and artefact use in mobile work and identify the opportunities for the development of appropriate technological solutions to support mobile workers.
The Accumulation Buffer: Hardware Support for High-Quality Rendering
, 1990
"... This paper describes a system architecture that supports realtime generation of complex images, efficient generation of extremely high-quality images, and a smooth trade-off between the two. Based on the paradigm of integration, the architecture extends a state-of-the-art rendering system with an ad ..."
Abstract
-
Cited by 179 (3 self)
- Add to MetaCart
with an additional high-precision image buffer. This additional buffer, called the Accumulation Buffer, is used to integrate images that are rendered into the framebuffer. While originally conceived as a solution to the problem of aliasing, the Accumulation Buffer provides a general solution to the problems
Tinypk: securing sensor networks with public key technology
- In SASN ’04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, 2004
"... Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military environments. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the ..."
Abstract
-
Cited by 151 (0 self)
- Add to MetaCart
the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks. Our work is novel in that PK technology was commonly believed to be too inefficient for use on low-power devices
The Quadrics Network: High-Performance Clustering Technology
- IEEE Micro
, 1998
"... The interconnection network and its associated software libraries are critical components for high-performance cluster computers and supercomputers, Web-server farms, and network-attached storage. Such components will greatly impact the design, architecture, and use of future systems. Key solutions ..."
Abstract
-
Cited by 148 (16 self)
- Add to MetaCart
The interconnection network and its associated software libraries are critical components for high-performance cluster computers and supercomputers, Web-server farms, and network-attached storage. Such components will greatly impact the design, architecture, and use of future systems. Key solutions
Biometrics: A tool for information security
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
, 2006
"... Establishing identity is becoming critical in our vastly interconnected society. Questions such as “Is she really who she claims to be?, ” “Is this person authorized to use this facility?, ” or “Is he in the watchlist posted by the government? ” are routinely being posed in a variety of scenarios r ..."
Abstract
-
Cited by 182 (4 self)
- Add to MetaCart
. In this paper, we provide an overview of biometrics and discuss some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security. The primary contribution of this overview includes: 1) examining applications where biometrics can
An Overview of MIMO Communications: A Key to Gigabit Wireless
- Proc. IEEE
, 2004
"... High data rate wireless communications, nearing 1 Gigabit/second (Gbps) transmission rates, is of interest in emerging Wireless Local Area Networks (WLANs) and home Audio/Visual (A/V) networks. Designing very high speed wireless links that offer good Quality-of-Service (QoS) and range capability in ..."
Abstract
-
Cited by 176 (0 self)
- Add to MetaCart
) and spectral efficiency (measured in bps/Hz) is equal to 10 9. As we shall outline in this paper, a variety of cost, technology and regulatory constraints make such a brute force solution unattractive if not impossible. The use of multiple antennas at transmitter and receiver, popularly known as multiple
Immersive Virtual Environment Technology as a Methodological Tool for Social Psychology
, 2002
"... Historically, at least 3 methodological problems have dogged experimental social psychology: the experimental control–mundane realism trade-off, lack of replication, and unrepresentative sampling. We argue that immersive virtual environment technology (IVET) can help ameliorate, if not solve, these ..."
Abstract
-
Cited by 137 (42 self)
- Add to MetaCart
Historically, at least 3 methodological problems have dogged experimental social psychology: the experimental control–mundane realism trade-off, lack of replication, and unrepresentative sampling. We argue that immersive virtual environment technology (IVET) can help ameliorate, if not solve
Toward a technology for organizational memories
- IEEE Intelligent Systems
, 1998
"... is one of an enterprise’s most important assets, decisively influencing its competitiveness, has fueled interest in comprehensive approaches to the basic activities of knowledge management: the identification, acquisition, development, dissemination, use, and preservation of the enterprise’s knowled ..."
Abstract
-
Cited by 140 (25 self)
- Add to MetaCart
and the qualitative and quantitative adaptation of this knowledge toward a changing environment. The technological approach, by contrast, deals with questions about what information technology should be provided to support knowledge management. 1 We find that effective knowledge management requires a hybrid solution
Results 21 - 30
of
28,267