Sciweavers

4118 search results - page 49 / 824
» Mechanisms for usage control
Sort
View
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
15 years 9 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...
COMCOM
2010
136views more  COMCOM 2010»
15 years 3 months ago
D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure
Traditionally, Internet Service Providers (ISPs) have to interconnect with content providers to provide network services to customers. The current business model that connectivity...
Jun Lei, Xiaoming Fu, Dieter Hogrefe
152
Voted
RTAS
2010
IEEE
15 years 1 months ago
Physicalnet: A Generic Framework for Managing and Programming Across Pervasive Computing Networks
This paper describes the design and implementation of a pervasive computing framework, named Physicalnet. Essentially, Physicalnet is a generic paradigm for managing and programmi...
Pascal Vicaire, Zhiheng Xie, Enamul Hoque, John A....
131
Voted
ASPLOS
2004
ACM
15 years 8 months ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...
ICRA
1995
IEEE
67views Robotics» more  ICRA 1995»
15 years 7 months ago
Visual Servoing Utilizing Zoom Mechanism
A camera, which is used as an artificial vision in visual servoing control, often has a zoom mechanism. A zoom mechanism cannot realize fast motion while an arm mechanism can, an...
Koh Hosoda, Hitoshi Moriyama, Minoru Asada