Sciweavers

4385 search results - page 839 / 877
» Abstraction for Concurrent Objects
Sort
View
MSWIM
2006
ACM
15 years 4 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
ICRA
2005
IEEE
130views Robotics» more  ICRA 2005»
15 years 4 months ago
Modeling and Control of Active End Effector for the AFM Based Nano Robotic Manipulators
Abstract— Nanomanipulation using Atomic Force Microscope (AFM) has been extensively investigated for many years. However, control of tip position during nanomanipulation is still...
Jiangbo Zhang, Guangyong Li, Ning Xi
IMC
2005
ACM
15 years 4 months ago
Poisson versus Periodic Path Probing (or, Does PASTA Matter?)
Abstract— The well-known PASTA (“Poisson Arrivals See Time Averages”) property states that, under very general conditions, the fraction of Poisson arrivals that observe an un...
Muhammad Mukarram Bin Tariq, Amogh Dhamdhere, Cons...
SACMAT
2005
ACM
15 years 4 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
CHARME
2005
Springer
94views Hardware» more  CHARME 2005»
15 years 4 months ago
Verifying Quantitative Properties Using Bound Functions
Abstract. We define and study a quantitative generalization of the traditional boolean framework of model-based specification and verification. In our setting, propositions have...
Arindam Chakrabarti, Krishnendu Chatterjee, Thomas...