Sciweavers

56 search results - page 8 / 12
» Principles of Digital Evolution Machines
Sort
View
AICOM
2002
103views more  AICOM 2002»
13 years 7 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen
HOTOS
2003
IEEE
14 years 20 days ago
Towards a Semantic-Aware File Store
—Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage systems. In this paper, we discuss the principles o...
Zhichen Xu, Magnus Karlsson, Chunqiang Tang, Chris...
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
13 years 9 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
ISSS
1996
IEEE
143views Hardware» more  ISSS 1996»
13 years 11 months ago
DSP Processor/Compiler Co-Design: A Quantitative Approach
In the paper the problem of processor/compiler codesign for digital signal processing and embedded SYstems is discussed. The main principle we follow is the top-down approach char...
Vojin Zivojnovic, Stefan Pees, C. Schälger, M...
DIM
2005
ACM
13 years 9 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...