Sciweavers

2259 search results - page 244 / 452
» Addressing Mode Selection
Sort
View
ECOOP
2009
Springer
15 years 9 months ago
Program Metamorphosis
Modern development environments support refactoring by providing atomically behaviour-preserving transformations. While useful, these transformations are limited in three ways: (i)...
Christoph Reichenbach, Devin Coughlin, Amer Diwan
111
Voted
ICNS
2009
IEEE
15 years 9 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
93
Voted
IROS
2009
IEEE
121views Robotics» more  IROS 2009»
15 years 9 months ago
Microparticle manipulation using multiple untethered magnetic micro-robots on an electrostatic surface
Abstract— This work presents the control of multiple untethered rectilinear magnetic micro-robots (Mag-µBots) with dimensions 250 × 130 × 100 µm3 actuated by pulsed external ...
Steven Floyd, Chytra Pawashe, Metin Sitti
123
Voted
CEC
2007
IEEE
15 years 9 months ago
A Utile Function Optimizer
Abstract— We recast the problem of unconstrained continuous evolutionary optimization as inference in a fixed graphical model. This approach allows us to address several pervasi...
Christopher K. Monson, Kevin D. Seppi, James L. Ca...
113
Voted
ECRTS
2007
IEEE
15 years 9 months ago
Predictable Paging in Real-Time Systems: A Compiler Approach
Conventionally, the use of virtual memory in real-time systems has been avoided, the main reason being the difficulties it provides to timing analysis. However, there is a trend ...
Isabelle Puaut, Damien Hardy