Sciweavers

323 search results - page 29 / 65
» Verify Your Runs
Sort
View
ICRA
2008
IEEE
129views Robotics» more  ICRA 2008»
14 years 2 months ago
Modeling of a closed loop cable-conduit transmission system
— Many surgical robots use cable-conduit pairs in a pull-pull configuration to actuate the instruments and transmit power into the patient’s body. Friction between the cable an...
Varun Agrawal, William J. Peine, Bin Yao
SCAM
2007
IEEE
14 years 1 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
DSN
2006
IEEE
14 years 1 months ago
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Albert Meixner, Daniel J. Sorin
ICSNC
2006
IEEE
14 years 1 months ago
Middleware - An Effort towards Making Mobile Applications Platform Independent
We propose a middleware architecture for GSM mobile phones that makes applications for mobile phones platform independent to a large extent as well as the applications made using ...
Neeraj Gupta, Vishal Srivastav, M. P. S. Bhatia
WECWIS
2005
IEEE
116views ECommerce» more  WECWIS 2005»
14 years 1 months ago
Security and Privacy Using One-Round Zero-Knowledge Proofs
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal wi...
Sultan Almuhammadi, Clifford Neuman