Sciweavers

543 search results - page 49 / 109
» Systems architecture: the empirical way: abstract architectu...
Sort
View
ICDCSW
2009
IEEE
14 years 2 months ago
Embedded Virtual Machines for Robust Wireless Control Systems
Embedded wireless networks have largely focused on openloop sensing and monitoring. To address actuation in closedloop wireless control systems there is a strong need to re-think ...
Rahul Mangharam, Miroslav Pajic
CCIA
2010
Springer
13 years 2 months ago
Comparison of Topologies in Peer-to-Peer Data Sharing Networks
Interactions within Multi-agent systems can be structured in different ways depending on the application scenario and its environmental restrictions. In previous work we have devel...
Jordi Campos Miralles, Nuria Piqué, Maite L...
SP
1999
IEEE
126views Security Privacy» more  SP 1999»
13 years 12 months ago
Flexible Policy-Directed Code Safety
This work introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform...
David Evans, Andrew Twyman
FGCS
2007
92views more  FGCS 2007»
13 years 7 months ago
Optimizing Web Service messaging performance in mobile computing
— The performance and efficiency of Web Services can be greatly increased in conversational and streaming message exchanges by streaming the message exchange paradigm. In this pa...
Sangyoon Oh, Geoffrey Fox
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...