Sciweavers

2849 search results - page 95 / 570
» As We Should Have Thought
Sort
View
ISCAS
2008
IEEE
106views Hardware» more  ISCAS 2008»
14 years 4 months ago
A quantitative evaluation of C-based synthesis on heterogeneous embedded systems design
C-based design techniques and methodologies have been proposed to tackle the complexity of heterogeneous embedded systems. The heterogeneity comes in the functionalities and the im...
Omar Hammami, Zoukun Wang, Virginie Fresse, Domini...
ICDCSW
2007
IEEE
14 years 4 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
ISWC
2006
IEEE
14 years 4 months ago
Using the "HotWire" to Study Interruptions in Wearable Computing Primary Tasks
As users of wearable computers are often involved in real-world tasks of critical nature, the management and handling of interruptions is crucial for efficient interaction and ta...
Mikael Drugge, Hendrik Witt, Peter Parnes, Kå...
LPNMR
2005
Springer
14 years 3 months ago
Data Integration and Answer Set Programming
Abstract. The rapid expansion of the Internet and World Wide Web led to growing interest in data and information integration, which should be capable to deal with inconsistent and ...
Thomas Eiter
SIGOPSE
2004
ACM
14 years 3 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn