Sciweavers

1064 search results - page 115 / 213
» Disjoint Systems (Extended Abstract)
Sort
View
131
Voted
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
16 years 3 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
129
Voted
EIT
2009
IEEE
15 years 10 months ago
System-level memory modeling for bus-based memory architecture exploration
—System-level design (SLD) provides a solution to the challenge of increasing design complexity and time-to-market pressure in modern embedded system designs. In this paper, we p...
Zhongbo Cao, Ramon Mercado, Diane T. Rover
142
Voted
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
15 years 10 months ago
A graphical approach for modeling time-dependent behavior of DSLs
Domain specific languages (DSLs) play a cornerstone Model-Driven Software Development. The abstract syntax of a DSL is usually defined by a metamodel, while inplace model transf...
José Eduardo Rivera, Francisco Durán...
112
Voted
IROS
2009
IEEE
180views Robotics» more  IROS 2009»
15 years 10 months ago
Control of redundant robots using learned models: An operational space control approach
Abstract— We present an adaptive control approach combining forward kinematics model learning methods with the operational space control approach. This combination endows the rob...
Camille Salaün, Vincent Padois, Olivier Sigau...
159
Voted
ISPAN
2009
IEEE
15 years 10 months ago
SoCQ: A Framework for Pervasive Environments
Abstract—Querying non-conventional data sources is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is...
Yann Gripay, Frédérique Laforest, Je...