Sciweavers

2814 search results - page 546 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
RAID
2004
Springer
15 years 10 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
MOBISYS
2009
ACM
16 years 5 months ago
Point&Connect: intention-based device pairing for mobile phone users
Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-and-connect: wh...
Chunyi Peng, Guobin Shen, Yongguang Zhang, Songwu ...
ISRR
2005
Springer
138views Robotics» more  ISRR 2005»
15 years 10 months ago
One Is Enough!
We postulate that multi-wheel statically-stable mobile robots for operation in human environments are an evolutionarydead end. Robots of this class tall enough to interact meaning...
Tom Lauwers, George Kantor, Ralph L. Hollis
SENSYS
2003
ACM
15 years 10 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 11 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...