Sciweavers

62 search results - page 5 / 13
» The Ackermann Award 2005
Sort
View
ASPDAC
2005
ACM
106views Hardware» more  ASPDAC 2005»
13 years 9 months ago
Using loop invariants to fight soft errors in data caches
Ever scaling process technology makes embedded systems more vulnerable to soft errors than in the past. One of the generic methods used to fight soft errors is based on duplicati...
Sri Hari Krishna Narayanan, Seung Woo Son, Mahmut ...
STOC
2005
ACM
142views Algorithms» more  STOC 2005»
14 years 7 months ago
Market equilibrium via the excess demand function
We consider the problem of computing market equilibria and show three results. (i) For exchange economies satisfying weak gross substitutability we analyze a simple discrete versi...
Bruno Codenotti, Benton McCune, Kasturi R. Varadar...
IROS
2006
IEEE
117views Robotics» more  IROS 2006»
14 years 1 months ago
Design and Manufacturing of a Mobile Rescue Robot
This paper presents design and manufacturing procedure of a tele-operative rescue robot. First, the general task to be performed by such a robot is defined, and variant kinematic m...
S. Ali A. Moosavian, Hesam Semsarilar, Arash Kalan...
ACSAC
2005
IEEE
14 years 1 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
ACMSE
2005
ACM
14 years 28 days ago
First year experiences of NSF REU grant: emerging issues in computer networking
In this paper, we describe our first year experiences of administering the NSF-supported Research Experiences for Undergraduates program award. Emerging issues in computer network...
Stan Kurkovsky, Bhagyavati