Sciweavers

102 search results - page 4 / 21
» Design, Implementation, and Remote Operation of the Humanoid...
Sort
View
WETICE
2005
IEEE
14 years 3 months ago
Transparent Remote File Access in the Minimum Intrusion Grid
This paper describes the implementation of a thin user-level layer to be installed on Grid resources. The layer fits in the Minimum intrusion Grid design by imposing as few requi...
Rasmus Andersen, Brian Vinter
USS
2010
13 years 7 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
HICSS
1996
IEEE
123views Biometrics» more  HICSS 1996»
14 years 1 months ago
Concurrency: A Case Study in Remote Tasking and Distributed IPC
Remote tasking encompasses different functionality, such as remote forking, multiple remote spawning, and task migration. In order to overcome the relatively high costs of these m...
Dejan S. Milojicic, Alan Langerman, David L. Black...
AIPR
2005
IEEE
14 years 3 months ago
Hyperspectral Detection Algorithms: Operational, Next Generation, on the Horizon
Abstract—The multi-band target detection algorithms implemented in hyperspectral imaging systems represent perhaps the most successful example of image fusion. A core suite of su...
A. Schaum
OSDI
2004
ACM
14 years 10 months ago
ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams
As dependence on the World Wide Web continues to grow, so does the need for businesses to have quantitative measures of the client perceived response times of their Web services. ...
David P. Olshefski, Jason Nieh, Erich M. Nahum