Sciweavers

1119 search results - page 137 / 224
» Computing in the Presence of Timing Failures
Sort
View
CCS
1994
ACM
13 years 12 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
ESA
2006
Springer
82views Algorithms» more  ESA 2006»
13 years 11 months ago
The Price of Resiliency: A Case Study on Sorting with Memory Faults
We address the problem of sorting in the presence of faults that may arbitrarily corrupt memory locations, and investigate the impact of memory faults both on the correctness and ...
Umberto Ferraro Petrillo, Irene Finocchi, Giuseppe...
LREC
2010
163views Education» more  LREC 2010»
13 years 9 months ago
Lexical Resources and Ontological Classifications for the Recognition of Proper Names Sense Extension
Particular uses of PNs with sense extension are focussed on and inspected taking into account the presence of PNs in lexical semantic databases and electronic corpora. Methodology...
Rita Marinelli
NETWORKING
2004
13 years 9 months ago
The Role of Information Update in Flow Control
A common feature of congestion control protocols is the presence of information packets used to signal congestion. We address here the question of how frequently such protocols nee...
Eitan Altman, Tamer Basar, Naceur Malouch
RAS
2006
84views more  RAS 2006»
13 years 7 months ago
Real-time safety for human-robot interaction
This paper presents a strategy for ensuring safety during human-robot interaction in real time. A measure of danger during the interaction is explicitly computed, based on factors ...
Dana Kulic, Elizabeth A. Croft