Sciweavers

1949 search results - page 117 / 390
» Protective Interface Specifications
Sort
View
CORR
2010
Springer
107views Education» more  CORR 2010»
13 years 10 months ago
mVideoCast: Mobile, real time ROI detection and streaming
A variety of applications are emerging to support streaming video from mobile devices. However, many tasks can benefit from streaming specific content rather than the full video f...
Scott Carter, Laurent Denoue, John Adcock
FPL
2010
Springer
106views Hardware» more  FPL 2010»
13 years 8 months ago
Increasing Design Productivity through Core Reuse, Meta-data Encapsulation, and Synthesis
This paper presents a novel IP core reuse strategy which reduces design time from days to hours for communication circuits such as digital radio receivers. This design productivity...
Adam Arnesen, Kevin Ellsworth, Derrick Gibelyou, T...
FDL
2005
IEEE
14 years 3 months ago
Mixing Synchronous Reactive and Untimed Models of Computation
The support of heterogeneity at the specification level, that is, the ability to mix several models of computation (MoCs) in the system-level specification, is becoming increasing...
Fernando Herrera, Eugenio Villar
CHI
2009
ACM
14 years 10 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
VLDB
1997
ACM
104views Database» more  VLDB 1997»
14 years 2 months ago
Integrating Reliable Memory in Databases
Abstract. Recent results in the Rio project at the University of Michigan show that it is possible to create an area of main memory that is as safe as disk from operating system cr...
Wee Teck Ng, Peter M. Chen