Sciweavers

536 search results - page 93 / 108
» A computer verified, monadic, functional implementation of t...
Sort
View
OSDI
2002
ACM
15 years 12 months ago
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides ...
Atul Adya, William J. Bolosky, Miguel Castro, Gera...
INFOCOM
2009
IEEE
15 years 6 months ago
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols
Abstract—This paper presents a protocol-independent approach to reveal a new insight into the performance of carrier sense multiple access with collision avoidance (CSMA/CA) prot...
Yu Cheng, Xinhua Ling, Weihua Zhuang
ICRA
2007
IEEE
160views Robotics» more  ICRA 2007»
15 years 6 months ago
Motion Tasks and Force Control for Robot Manipulators on Embedded 2-D Manifolds
— In this paper we present a methodology to drive the end effector of a robotic manipulator across the surface of an object in the workspace, and at the same time the manipulator...
Xanthi Papageorgiou, Savvas G. Loizou, Kostas J. K...
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...
SAFECOMP
2001
Springer
15 years 4 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...