Sciweavers

2838 search results - page 170 / 568
» Verifying Controlled Components
Sort
View
IBMRD
2007
47views more  IBMRD 2007»
13 years 10 months ago
Cell Broadband Engine processor vault security architecture
    Current data protection technologies such as those based on public‐key encryption and broadcast  encryption  focus  on  the  secure  control  and  prote...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty
AROBOTS
2000
108views more  AROBOTS 2000»
13 years 10 months ago
Optimal Selection of Uncertain Actions by Maximizing Expected Utility
A new means of action selection via utility fusion is introduced as an alternative to both sensor fusion and command fusion. Distributed asynchronous behaviors indicate the utility...
Julio Rosenblatt
WD
2010
13 years 8 months ago
Sender- and receiver-centered interference in wireless ad hoc networks
Energy consumption in general and interference in particular are among the most critical issues in wireless networks. In this paper we present the E-BUM calculus, a Energy-aware ca...
Lucia Gallina, Sabina Rossi
NIME
2004
Springer
125views Music» more  NIME 2004»
14 years 4 months ago
Techniques for Multi-Channel Real-Time Spatial Distribution Using Frequency-Domain Processing
The authors have developed several methods for spatially distributing spectral material in real-time using frequency-domain processing. Applying spectral spatialization techniques...
Ryan H. Torchia, Cort Lippe
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 10 months ago
Integrating OPC Data into GSN Infrastructures
This paper presents the design and the implementation of an interface software component between OLE for Process Control (OPC) formatted data and the Global ...
Olivier Passalacqua, Eric Benoit, Marc-Philippe Hu...