Sciweavers

183 search results - page 13 / 37
» On Mechanical Control Systems with Nonholonomic Constraints ...
Sort
View
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 1 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
IWSSD
2000
IEEE
14 years 1 days ago
Design Guidance through the Controlled Application of Constraints
We seek to facilitate development of high quality software designs and architectures by using rigorous process definitions to guide application of the complex structure of relati...
Aaron G. Cass, Leon J. Osterweil
IROS
2006
IEEE
208views Robotics» more  IROS 2006»
14 years 1 months ago
Modeling Soft Contact Mechanism of Biological Cells Using an Atomic Force Bio-Microscope
— The development of a mechanical force sensing device system based on force/vision feedback control for exploring in vitro the contact mechanics of human adherent cervix Epithel...
Maxime Girot, Mehdi Boukallel, Stephane Rég...
IPPS
2007
IEEE
14 years 1 months ago
A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems
Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, wh...
Samee Ullah Khan, Ishfaq Ahmad
CODASPY
2012
12 years 3 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...