Sciweavers

2747 search results - page 283 / 550
» Network externalities in software systems
Sort
View
ICRA
2006
IEEE
210views Robotics» more  ICRA 2006»
14 years 4 months ago
Programmable Central Pattern Generators: an Application to Biped Locomotion Control
— We present a system of coupled nonlinear oscillators to be used as programmable central pattern generators, and apply it to control the locomotion of a humanoid robot. Central ...
Ludovic Righetti, Auke Jan Ijspeert
VRML
1999
ACM
14 years 3 months ago
Staging the Space of Mixed Reality - Reconsidering the Concept of a Multi User Environment
This paper presents our work and research findings on developing the concept of a multi-user shared environment for culture, performance, art and entertainment. It introduces arti...
Wolfgang Strauss, Monika Fleischmann, Mette Thomse...
EUROSYS
2006
ACM
14 years 7 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
FASE
2009
Springer
14 years 5 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
SBACPAD
2007
IEEE
110views Hardware» more  SBACPAD 2007»
14 years 5 months ago
Architectural Breakdown of End-to-End Latency in a TCP/IP Network
Adoption of the 10GbE Ethernet standard has been impeded by two important performance-oriented considerations: 1) processing requirements of common protocol stacks and 2) end-to-e...
Steen Larsen, Parthasarathy Sarangam, Ram Huggahal...