Sciweavers

58 search results - page 9 / 12
» A Modular Approach for Model-Based Dependability Evaluation ...
Sort
View
POPL
2012
ACM
12 years 3 months ago
Programming with binders and indexed data-types
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by refining the type system of ML with a rest...
Andrew Cave, Brigitte Pientka
PERCOM
2007
ACM
14 years 7 months ago
Buddy tracking - efficient proximity detection among mobile friends
: Global positioning systems (GPS) and mobile phone networks are making it possible to track individual users with an increasing accuracy. It is natural to ask whether one can use ...
Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwa...
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
13 years 6 months ago
Modeling and decision making in spatio-temporal processes for environmental surveillance
Abstract— The need for efficient monitoring of spatiotemporal dynamics in large environmental surveillance applications motivates the use of robotic sensors to achieve sufficie...
Amarjeet Singh 0003, Fabio Ramos, Hugh D. Whyte, W...
ICS
2004
Tsinghua U.
14 years 1 months ago
Cluster prefetch: tolerating on-chip wire delays in clustered microarchitectures
The growing dominance of wire delays at future technology points renders a microprocessor communication-bound. Clustered microarchitectures allow most dependence chains to execute...
Rajeev Balasubramonian
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...