Sciweavers

1986 search results - page 360 / 398
» An activity based costing approach to systems development an...
Sort
View
EMSOFT
2005
Springer
14 years 2 months ago
HAIL: a language for easy and correct device access
It is difficult to write device drivers. One factor is that writing low-level code for accessing devices and manipulating their registers is tedious and error-prone. For many syst...
Jun Sun 0002, Wanghong Yuan, Mahesh Kallahalla, Na...
JSAC
2010
153views more  JSAC 2010»
13 years 3 months ago
Autonomic traffic engineering for network robustness
Abstract--The continuously increasing complexity of communication networks and the increasing diversity and unpredictability of traffic demand has led to a consensus view that the ...
Ali Tizghadam, Alberto Leon-Garcia
CODES
2005
IEEE
14 years 2 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
IJRR
2010
88views more  IJRR 2010»
13 years 3 months ago
Extracting Object Contours with the Sweep of a Robotic Whisker Using Torque Information
Several recent studies have investigated the problem of object feature extraction with artificial whiskers. Many of these studies have used an approach in which the whisker is rot...
Joseph H. Solomon, Mitra J. Z. Hartmann
MOBISYS
2004
ACM
14 years 8 months ago
Improving the Latency of 802.11 hand-offs using Neighbor Graphs
The 802.11 IEEE Standard has enabled low cost and effective wireless LAN services (WLAN). With the sales and deployment of WLAN based networks exploding, many people believe that ...
Minho Shin, Arunesh Mishra, William A. Arbaugh