Sciweavers

1619 search results - page 253 / 324
» Important Moments in Systems and Control
Sort
View
SAINT
2002
IEEE
14 years 1 months ago
Incremental Hoarding and Reintegration in Mobile Environments
Disconnection is one of the popular techniques for operating in mobile environments and is here to stay, until long-range wireless connectivity becomes a reality. However, disconn...
Abdelsalam Helal, Abhinav Khushraj, Jinsuo Zhang
CHI
2004
ACM
14 years 9 months ago
Dual ecologies of robot as communication media: thoughts on coordinating orientations and projectability
The aim of our study is to investigate systems for supporting remote instruction via a mobile robot. In the real world, instructions are typically given through words and body ori...
Hideaki Kuzuoka, Keiichi Yamazaki, Akiko Yamazaki,...
EUROSYS
2009
ACM
14 years 5 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 2 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
RTSS
2000
IEEE
14 years 1 months ago
A User-Customizable Energy-Adaptive Combined Static/Dynamic Scheduler for Mobile Applications
In portable applications, the energy consumed by OS and application tasks primarily comes from DC battery source, which is limited and imposes an upper bound to the amount of time...
Trolan C. L. Ma, Kang G. Shin