Sciweavers

469 search results - page 78 / 94
» Two Approaches for a Servomechanism Control System Using Com...
Sort
View
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CIDR
2009
167views Algorithms» more  CIDR 2009»
13 years 8 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
ICASSP
2009
IEEE
14 years 2 months ago
Pitch bends and tonguing articulation in clarinet physical modeling synthesis
A physical modeling approach is used to investigate playing effects in woodwind instruments. This builds upon prior work concerning both empirical studies of the acoustics of the ...
Mark Sterling, Xiaoxiao Dong, Mark Bocko
RTSS
2006
IEEE
14 years 1 months ago
LITMUS^RT : A Testbed for Empirically Comparing Real-Time Multiprocessor Schedulers
We present a real-time, Linux-based testbed called LITMUSRT , which we have developed for empirically evaluating multiprocessor real-time scheduling algorithms. We also present th...
John M. Calandrino, Hennadiy Leontyev, Aaron Block...
ECBS
2008
IEEE
116views Hardware» more  ECBS 2008»
14 years 1 months ago
CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments
System execution modeling (SEM) tools provide an effective means to evaluate the quality of service (QoS) of enterprise distributed real-time and embedded (DRE) systems. SEM tools...
James H. Hill, Douglas C. Schmidt, Adam A. Porter,...