Sciweavers

922 search results - page 107 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 3 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
ACMSE
2006
ACM
14 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
14 years 2 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang
SAC
2004
ACM
14 years 2 months ago
Propositional planning in BDI agents
This paper aims to describe the relationship between propositional planning systems and the process of means-end reasoning used by BDI agents. To show such relationship, we defin...
Felipe Rech Meneguzzi, Avelino F. Zorzo, Michael d...
AFRIGRAPH
2004
ACM
14 years 2 months ago
Visualizing 3D scenes using non-linear projections and data mining of previous camera movements
We describe techniques for exploring 3D scenes by combining non-linear projections with the interactive data mining of camera navigations from previous explorations. Our approach ...
Karan Singh, Ravin Balakrishnan