Sciweavers

360 search results - page 59 / 72
» Remote Access of Computer Controlled Experiments
Sort
View
ICNP
2006
IEEE
14 years 1 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
SOSP
2003
ACM
14 years 4 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
ICML
2009
IEEE
14 years 8 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
SIES
2008
IEEE
14 years 1 months ago
Performance evaluation of a java chip-multiprocessor
—Chip multiprocessing design is an emerging trend for embedded systems. In this paper, we introduce a Java multiprocessor system-on-chip called JopCMP. It is a symmetric shared-m...
Christof Pitter, Martin Schoeberl
GEOINFORMATICA
2008
135views more  GEOINFORMATICA 2008»
13 years 7 months ago
Automatically and Accurately Conflating Raster Maps with Orthoimagery
Recent growth of geospatial information online has made it possible to access various maps and orthoimagery. Conflating these maps and imagery can create images that combine the vi...
Ching-Chien Chen, Craig A. Knoblock, Cyrus Shahabi