Sciweavers

3424 search results - page 139 / 685
» Building Diverse Computer Systems
Sort
View
CN
2004
108views more  CN 2004»
13 years 7 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
DAC
2000
ACM
14 years 9 months ago
System chip test: how will it impact your design?
A major challenge in realizing core-based system chips is the adoption and design-in of adequate test and diagnosis strategies. This tutorial paper discusses the specific challeng...
Yervant Zorian, Erik Jan Marinissen
PERCOM
2006
ACM
14 years 7 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
DEXAW
2004
IEEE
170views Database» more  DEXAW 2004»
13 years 11 months ago
On-Line Analytical Processing on Large Databases Managed by Computational Grids
Management of large data repositories integrated into the Grid poses new challenges for Grid research. There already exist several successful Data Grid projects addressing process...
Bernhard Fiser, Umut Onan, Ibrahim Elsayed, Peter ...
ACL
2009
13 years 5 months ago
Comparing Objective and Subjective Measures of Usability in a Human-Robot Dialogue System
We present a human-robot dialogue system that enables a robot to work together with a human user to build wooden construction toys. We then describe a study in which na
Mary Ellen Foster, Manuel Giuliani, Alois Knoll