Sciweavers

446 search results - page 72 / 90
» An approach to safe object sharing
Sort
View
AGENTS
2000
Springer
14 years 1 months ago
Capability-based agent matchmaking
In an agent-based system, where different agents form dynamic associations for the purposes of collaborative processing, agents must be able to locate other agents that can provi...
Anthony R. Cassandra, Damith Chandrasekara, Marian...
CODES
1999
IEEE
14 years 1 months ago
A hardware-software cosynthesis technique based on heterogeneous multiprocessor scheduling
In this paper, we propose a fast and simple heuristic for the cosynthesis problem targeting the system-on-chip (SOC) design. The proposed algorithm covers from implementation sele...
Hyunok Oh, Soonhoi Ha
CCR
2010
133views more  CCR 2010»
13 years 8 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
TEI
2009
ACM
95views Hardware» more  TEI 2009»
14 years 3 months ago
Living interfaces: the intimate door lock
In this paper we introduce a new way to interact intimately with an automated system. The Intimate Door Lock investigates the psychological effects of intimate humanhuman interact...
Miriam Roy, Fabian Hemmert, Reto Wettach
KI
2007
Springer
14 years 2 months ago
LiSA: A Robot Assistant for Life Sciences
This paper presents a mobile service robot that assists users in biological and pharmaceutical laboratories by carrying out routine jobs such as filling and transportation of micr...
Erik Schulenburg, Norbert Elkmann, Markus Fritzsch...