Sciweavers

264 search results - page 14 / 53
» Source-Based Trace Exploration
Sort
View
CODES
2004
IEEE
14 years 1 months ago
Efficient exploration of on-chip bus architectures and memory allocation
Separation between computation and communication in system design allows the system designer to explore the communication architecture independently of component selection and map...
Sungchan Kim, Chaeseok Im, Soonhoi Ha
ICRA
2008
IEEE
129views Robotics» more  ICRA 2008»
14 years 4 months ago
Slope traversal experiments with slip compensation control for lunar/planetary exploration rover
— This paper presents slope traversal experiments with slip compensation control for lunar/planetary exploration rovers. On loose soil, wheels of the rover easily slip even when ...
Genya Ishigami, Keiji Nagatani, Kazuya Yoshida
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 2 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
HUC
2010
Springer
13 years 10 months ago
Exploring end user preferences for location obfuscation, location-based services, and the value of location
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can revea...
A. J. Bernheim Brush, John Krumm, James Scott
ICPP
2009
IEEE
14 years 4 months ago
Exploring the Cost-Availability Tradeoff in P2P Storage Systems
—P2P storage systems use replication to provide a certain level of availability. While the system must generate new replicas to replace replicas lost to permanent failures, it ca...
Zhi Yang, Yafei Dai, Zhen Xiao