Sciweavers

2945 search results - page 544 / 589
» Designing and Implementing Malicious Hardware
Sort
View
AROBOTS
2008
177views more  AROBOTS 2008»
15 years 4 months ago
Controlling swimming and crawling in a fish robot using a central pattern generator
Online trajectory generation for robots with multiple degrees of freedom is still a difficult and unsolved problem, in particular for non-steady state locomotion, that is, when th...
Alessandro Crespi, Daisy Lachat, Ariane Pasquier, ...
FUIN
2008
119views more  FUIN 2008»
15 years 4 months ago
Modeling Communication with Synchronized Environments
A deterministic behavior of systems composed of several modules is a desirable design goal. Assembling a complex system from components requires also a high degree of re-usability....
Tiberiu Seceleanu, Axel Jantsch
135
Voted
JSW
2007
102views more  JSW 2007»
15 years 4 months ago
A Novel Framework for Building Distributed Data Acquisition and Monitoring Systems
— We propose a novel framework for building a distributed data acquisition and monitoring system. Our novel framework is mainly based on XML leverages and OPC (Openness, Producti...
Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi
CN
2002
77views more  CN 2002»
15 years 4 months ago
Architecture of a Web server accelerator
We describe the design, implementation and performance of a high-performance Web server accelerator which runs on an embedded operating system and improves Web server performance ...
Junehwa Song, Arun Iyengar, Eric Levy-Abegnoli, Da...
PVLDB
2010
204views more  PVLDB 2010»
15 years 2 months ago
Cheetah: A High Performance, Custom Data Warehouse on Top of MapReduce
Large-scale data analysis has become increasingly important for many enterprises. Recently, a new distributed computing paradigm, called MapReduce, and its open source implementat...
Songting Chen