Sciweavers

6010 search results - page 1031 / 1202
» Computational Approaches to Drug Design
Sort
View
PERCOM
2009
ACM
14 years 4 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
AOSD
2009
ACM
14 years 4 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
HRI
2009
ACM
14 years 4 months ago
Situated messages for asynchronous human-robot interaction
An ongoing issue in human robot interaction (HRI) is how people and robots communicate with one another. While there is considerable work in real-time human-robot communication, f...
Nicolai Marquardt, James Everett Young, Ehud Sharl...
FPGA
2009
ACM
180views FPGA» more  FPGA 2009»
14 years 4 months ago
Scalable don't-care-based logic optimization and resynthesis
We describe an optimization method for combinational and sequential logic networks, with emphasis on scalability and the scope of optimization. The proposed resynthesis (a) is cap...
Alan Mishchenko, Robert K. Brayton, Jie-Hong Rolan...
RTCSA
2009
IEEE
14 years 4 months ago
Bounding the Maximum Length of Non-preemptive Regions under Fixed Priority Scheduling
The question whether preemptive systems are better than non-preemptive systems has been debated for a long time, but only partial answers have been provided in the real-time liter...
Gang Yao, Giorgio C. Buttazzo, Marko Bertogna
« Prev « First page 1031 / 1202 Last » Next »