Sciweavers

44 search results - page 4 / 9
» Single-Pass Redundancy Addition and Removal
Sort
View
CORR
2012
Springer
225views Education» more  CORR 2012»
12 years 3 months ago
The Filter-Placement Problem and its Application to Minimizing Information Multiplicity
In many information networks, data items – such as updates in social networks, news flowing through interconnected RSS feeds and blogs, measurements in sensor networks, route u...
Dóra Erdös, Vatche Ishakian, Andrei La...
IH
2004
Springer
14 years 25 days ago
Information Hiding in Finite State Machine
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
Lin Yuan, Gang Qu
ISER
1993
Springer
227views Robotics» more  ISER 1993»
13 years 11 months ago
Design of a Hydraulic Robot Shoulder Based on a Combinatorial Mechanism
In previous papers, I have argued that while parallel mechanisms are well known for their favorable structural properties, their utility is generally limited by an inherently small...
Vincent Hayward
ATS
2003
IEEE
100views Hardware» more  ATS 2003»
13 years 11 months ago
A Processor-Based Built-In Self-Repair Design for Embedded Memories
We propose an embedded processor-based built-in self-repair (BISR) design for embedded memories. In the proposed design we reuse the embedded processor that can be found on almost...
Chin-Lung Su, Rei-Fu Huang, Cheng-Wen Wu
CCS
2007
ACM
14 years 1 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder