Sciweavers

2178 search results - page 247 / 436
» Toward Systemically Secure IT Architectures
Sort
View
RAS
2010
164views more  RAS 2010»
13 years 8 months ago
Towards performing everyday manipulation activities
This article investigates fundamental issues in scaling autonomous personal robots towards open-ended sets of everyday manipulation tasks which involve high complexity and vague j...
Michael Beetz, Dominik Jain, Lorenz Mösenlech...
ASAP
2009
IEEE
80views Hardware» more  ASAP 2009»
14 years 6 months ago
Specialization of the Cell SPE for Media Applications
— There is a clear trend towards multi-cores to meet the performance requirements of emerging and future applications. A different way to scale performance is, however, to specia...
Cor Meenderinck, Ben H. H. Juurlink
PUC
1998
101views more  PUC 1998»
13 years 9 months ago
Palmtop Programmable Appliance Controls
Palmtop PCs with infrared transceivers provide a userfriendly, intelligent, and extensible alternative to the remote controls traditionally used to control home appliances. We des...
Diomidis Spinellis
JOT
2008
445views more  JOT 2008»
13 years 9 months ago
From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)
The purpose of this article is to provide a brief insight about how to link your business vision, goals, strategies, tactics as well as business rules according to BMM, then bridg...
Birol Berkem
OSDI
2008
ACM
14 years 10 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...