Sciweavers

1415 search results - page 235 / 283
» Verified systems by composition from verified components
Sort
View
IH
2004
Springer
14 years 1 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
ICRA
2002
IEEE
93views Robotics» more  ICRA 2002»
14 years 20 days ago
Combining Haptic and Visual Servoing for Cardiothoracic Surgery
Cardiovascular disease is one of the leading causes of death in the United States and also a major disease worldwide with over 700,000 coronary artery bypass graft (CABG) procedur...
Christopher W. Kennedy, Tie Hu, Jaydev P. Desai
GPCE
2009
Springer
14 years 10 days ago
A language and framework for invariant-driven transformations
This paper describes a language and framework that allow coordinated transformations driven by invariants to be specified declaratively, as invariant rules, and applied automatic...
Yanhong A. Liu, Michael Gorbovitski, Scott D. Stol...
INFOCOM
1999
IEEE
14 years 1 days ago
Scalable Flow Control for Multicast ABR Services
We propose a flow-control scheme for multicast ABR services in ATM networks. At the heart of the proposed scheme is an optimal secondorder rate control algorithm, called the -contr...
Xi Zhang, Kang G. Shin, Debanjan Saha, Dilip D. Ka...
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
14 years 1 hour ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen