Sciweavers

2513 search results - page 478 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
DATE
2008
IEEE
156views Hardware» more  DATE 2008»
14 years 4 months ago
Transparent Reconfigurable Acceleration for Heterogeneous Embedded Applications
Embedded systems are becoming increasingly complex. Besides the additional processing capabilities, they are characterized by high diversity of computational models coexisting in ...
Antonio Carlos Schneider Beck, Mateus B. Rutzig, G...
HICSS
2008
IEEE
172views Biometrics» more  HICSS 2008»
14 years 4 months ago
Semantic Web Services Monitoring: An OWL-S Based Approach
In this paper we describe mechanisms for execution monitoring of semantic web services, based on OWL-S. The use of semantic descriptions and ontologies is a valuable extension to ...
Roman Vaculín, Katia P. Sycara
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
14 years 4 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
IROS
2008
IEEE
108views Robotics» more  IROS 2008»
14 years 4 months ago
Robots at home: Understanding long-term human-robot interaction
— Human-robot interaction (HRI) is now well enough understood to allow us to build useful systems that can function outside of the laboratory. We are studying longterm interactio...
Cory D. Kidd, Cynthia Breazeal
DDECS
2007
IEEE
105views Hardware» more  DDECS 2007»
14 years 4 months ago
Layout to Logic Defect Analysis for Hierarchical Test Generation
- As shown by previous studies, shorts between the interconnect wires should be considered as the predominant cause of failures in CMOS circuits. Fault models and tools for targeti...
Maksim Jenihhin, Jaan Raik, Raimund Ubar, Witold A...