• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 28,267
Next 10 →

DAGON: Technology Binding and Local Optimization by DAG

by Kurt Keutzer - Matching”, Proc. ACM/IEEE Design Automation Conference , 1987
"... Technology binding is the process of mapping a technology independent description of a circuit into a particular tech-nology. This paper outlines a formalism of this problem and offers a solution to the problem in terms of matching patterns, describing technology specific cells and optimiza-tions, a ..."
Abstract - Cited by 155 (1 self) - Add to MetaCart
Technology binding is the process of mapping a technology independent description of a circuit into a particular tech-nology. This paper outlines a formalism of this problem and offers a solution to the problem in terms of matching patterns, describing technology specific cells and optimiza-tions

SOME ASYMPTOTIC METHODS FOR STRONGLY NONLINEAR EQUATIONS

by Ji-huan He , 2006
"... This paper features a survey of some recent developments in asymptotic techniques, which are valid not only for weakly nonlinear equations, but also for strongly ones. Further, the obtained approximate analytical solutions are valid for the whole solution domain. The limitations of traditional pertu ..."
Abstract - Cited by 185 (6 self) - Add to MetaCart
This paper features a survey of some recent developments in asymptotic techniques, which are valid not only for weakly nonlinear equations, but also for strongly ones. Further, the obtained approximate analytical solutions are valid for the whole solution domain. The limitations of traditional

Dealing with Mobility: Understanding access anytime, anywhere

by Mark Perry, Kenton O'Hara, Abigail Sellen, Barry Brown, Richard Harper
"... The rapid and accelerating move towards the adoption and use of mobile technologies has increasingly provided people and organisations with the ability to work away from the office and on the move. The new ways of working afforded by these technologies are often characterised in terms of the access ..."
Abstract - Cited by 179 (7 self) - Add to MetaCart
and artefact use in mobile work and identify the opportunities for the development of appropriate technological solutions to support mobile workers.

The Accumulation Buffer: Hardware Support for High-Quality Rendering

by Paul Haeberli, Kurt Akeley , 1990
"... This paper describes a system architecture that supports realtime generation of complex images, efficient generation of extremely high-quality images, and a smooth trade-off between the two. Based on the paradigm of integration, the architecture extends a state-of-the-art rendering system with an ad ..."
Abstract - Cited by 179 (3 self) - Add to MetaCart
with an additional high-precision image buffer. This additional buffer, called the Accumulation Buffer, is used to integrate images that are rendered into the framebuffer. While originally conceived as a solution to the problem of aliasing, the Accumulation Buffer provides a general solution to the problems

Tinypk: securing sensor networks with public key technology

by Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus - In SASN ’04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks , 2004
"... Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military environments. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the ..."
Abstract - Cited by 151 (0 self) - Add to MetaCart
the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks. Our work is novel in that PK technology was commonly believed to be too inefficient for use on low-power devices

The Quadrics Network: High-Performance Clustering Technology

by Fabrizio Petrini, Wu-chun Feng, Adolfy Hoisie, Salvador Coll, Eitan Frachtenberg - IEEE Micro , 1998
"... The interconnection network and its associated software libraries are critical components for high-performance cluster computers and supercomputers, Web-server farms, and network-attached storage. Such components will greatly impact the design, architecture, and use of future systems. Key solutions ..."
Abstract - Cited by 148 (16 self) - Add to MetaCart
The interconnection network and its associated software libraries are critical components for high-performance cluster computers and supercomputers, Web-server farms, and network-attached storage. Such components will greatly impact the design, architecture, and use of future systems. Key solutions

Biometrics: A tool for information security

by Anil K. Jain, Arun Ross, Sharath Pankanti - IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , 2006
"... Establishing identity is becoming critical in our vastly interconnected society. Questions such as “Is she really who she claims to be?, ” “Is this person authorized to use this facility?, ” or “Is he in the watchlist posted by the government? ” are routinely being posed in a variety of scenarios r ..."
Abstract - Cited by 182 (4 self) - Add to MetaCart
. In this paper, we provide an overview of biometrics and discuss some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security. The primary contribution of this overview includes: 1) examining applications where biometrics can

An Overview of MIMO Communications: A Key to Gigabit Wireless

by A. J. Paulraj, D. Gore, R. U. Nabar, H. Bölcskei - Proc. IEEE , 2004
"... High data rate wireless communications, nearing 1 Gigabit/second (Gbps) transmission rates, is of interest in emerging Wireless Local Area Networks (WLANs) and home Audio/Visual (A/V) networks. Designing very high speed wireless links that offer good Quality-of-Service (QoS) and range capability in ..."
Abstract - Cited by 176 (0 self) - Add to MetaCart
) and spectral efficiency (measured in bps/Hz) is equal to 10 9. As we shall outline in this paper, a variety of cost, technology and regulatory constraints make such a brute force solution unattractive if not impossible. The use of multiple antennas at transmitter and receiver, popularly known as multiple

Immersive Virtual Environment Technology as a Methodological Tool for Social Psychology

by Jim Blascovich, Jack Loomis, Andrew C. Beall, Kimberly R. Swinth, Crystal L. Hoyt, Jeremy N. Bailenson , 2002
"... Historically, at least 3 methodological problems have dogged experimental social psychology: the experimental control–mundane realism trade-off, lack of replication, and unrepresentative sampling. We argue that immersive virtual environment technology (IVET) can help ameliorate, if not solve, these ..."
Abstract - Cited by 137 (42 self) - Add to MetaCart
Historically, at least 3 methodological problems have dogged experimental social psychology: the experimental control–mundane realism trade-off, lack of replication, and unrepresentative sampling. We argue that immersive virtual environment technology (IVET) can help ameliorate, if not solve

Toward a technology for organizational memories

by Andreas Abecker, Ansgar Bernardi, Knut Hinkelmann, Otto Kühn, Michael Sintek - IEEE Intelligent Systems , 1998
"... is one of an enterprise’s most important assets, decisively influencing its competitiveness, has fueled interest in comprehensive approaches to the basic activities of knowledge management: the identification, acquisition, development, dissemination, use, and preservation of the enterprise’s knowled ..."
Abstract - Cited by 140 (25 self) - Add to MetaCart
and the qualitative and quantitative adaptation of this knowledge toward a changing environment. The technological approach, by contrast, deals with questions about what information technology should be provided to support knowledge management. 1 We find that effective knowledge management requires a hybrid solution
Next 10 →
Results 21 - 30 of 28,267
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University