Sciweavers

883 search results - page 101 / 177
» Getting the right design and the design right
Sort
View
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 3 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
ICRA
2007
IEEE
119views Robotics» more  ICRA 2007»
14 years 3 months ago
Implementation of Bio-Inspired Vestibulo-Ocular Reflex in a Quadrupedal Robot
— Studies of primate locomotion have shown that the head and eyes are stabilized in space through the vestibulo-collic and vestibulo ocular Reflexes (VCR, VOR). The VOR is a refl...
Ravi Kaushik, Marek Marcinkiewicz, Jizhong Xiao, S...
IPPS
2007
IEEE
14 years 3 months ago
Storage Optimization for Large-Scale Distributed Stream Processing Systems
We consider storage in an extremely large-scale distributed computer system designed for stream processing applications. In such systems, incoming data and intermediate results ma...
Kirsten Hildrum, Fred Douglis, Joel L. Wolf, Phili...
CCS
2007
ACM
14 years 3 months ago
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modu...
David Kyle, José Carlos Brustoloni
ICSOC
2007
Springer
14 years 3 months ago
Service License Composition and Compatibility Analysis
Services enable the transformation of the World Wide Web as distributed interoperable systems interacting beyond organizational boundaries. Service licensing enables broader usage ...
G. R. Gangadharan, Michael Weiss, Vincenzo D'Andre...