Sciweavers

10797 search results - page 2075 / 2160
» Robust control applications
Sort
View
121
Voted
ICCCN
2007
IEEE
15 years 9 months ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
15 years 9 months ago
A humanoid upper body system for two-handed manipulation
— This video presents a humanoid two-arm system developed as a research platform for studying dexterous twohanded manipulation. The system is based on the modular DLR-Lightweight...
Christoph Borst, Christian Ott, Thomas Wimböc...
IEEESCC
2007
IEEE
15 years 9 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
INFOCOM
2007
IEEE
15 years 9 months ago
Tradeoff Between Lifetime and Rate Allocation in Wireless Sensor Networks: A Cross Layer Approach
— This paper studies the tradeoff between energy consumption and application performance in wireless sensor networks by investigating the interaction between network lifetime max...
Junhua Zhu, Shan Chen, Brahim Bensaou, Ka-Lok Hung
MICRO
2007
IEEE
128views Hardware» more  MICRO 2007»
15 years 9 months ago
A Framework for Providing Quality of Service in Chip Multi-Processors
The trends in enterprise IT toward service-oriented computing, server consolidation, and virtual computing point to a future in which workloads are becoming increasingly diverse i...
Fei Guo, Yan Solihin, Li Zhao, Ravishankar Iyer
« Prev « First page 2075 / 2160 Last » Next »