Sciweavers

1742 search results - page 144 / 349
» An Applicative Module Calculus
Sort
View
107
Voted
CCS
2006
ACM
15 years 4 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
94
Voted
ISER
2000
Springer
82views Robotics» more  ISER 2000»
15 years 4 months ago
Towards a Team of Robots with Repair Capabilities: A Visual Docking System
: In the future, we propose that there will be largely self-sufficient robot colonies operating on distant planets and in harsh environments here on earth. A highly desirable quali...
Curt A. Bererton, Pradeep K. Khosla
95
Voted
DELOS
2007
15 years 2 months ago
MESSIF: Metric Similarity Search Implementation Framework
The similarity search has become a fundamental computational task in many applications. One of the mathematical models of the similarity – the metric space – has drawn attenti...
Michal Batko, David Novak, Pavel Zezula
113
Voted
ICWN
2004
15 years 2 months ago
An Embedded Healthcare System for Blood Glucose Monitoring in a Body Area Network
This paper presents a Java service platform and hardware design for a handheld healthcare system that enables remote health monitoring using CDMA public wireless networks. Special...
Kil-Ho Ahn, Jae-Wan Park, Dong Ryeol Shin, Ji-Tae ...
115
Voted
WISES
2003
15 years 2 months ago
Built-In Fault Injectors - The Logical Continuation of BIST?
— With the increasing number of embedded computer systems being used in safety critical applications the testing and assessment of a system’s fault tolerance properties become ...
Andreas Steininger, Babak Rahbaran, Thomas Handl