Sciweavers

2726 search results - page 464 / 546
» Application security support in the operating system kernel
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 4 months ago
Combining RFID Technology and Business Intelligence for Supply Chain Optimization' Scenarios for Retail Logistics
“Radio Frequency Identification” (RFID) and the related EPC standards promise to enable an automatic collection of supply chain data for optimization purposes. While extensive...
Henning Baars, Hans-Georg Kemper, Heiner Lasi, Mar...
ISCAS
2007
IEEE
135views Hardware» more  ISCAS 2007»
15 years 4 months ago
Design of Mixed-Voltage Crystal Oscillator Circuit in Low-Voltage CMOS Technology
Abstract—In the nanometer-scale CMOS technology, the gateoxide thickness has been scaled down to support a higher operating speed under a lower power supply (1xVDD). However, the...
Ming-Dou Ker, Hung-Tai Liao
SOCO
2005
Springer
15 years 3 months ago
A Model of Components with Non-regular Protocols
Abstract. Behavioral specifications that are integrated into component interfaces are an important means for the correct construction of component-based systems. Currently, such s...
Mario Südholt
EDOC
2003
IEEE
15 years 3 months ago
Integrating CBSE, SoC, MDA, and AOP in a Software Development Method
Component-Based Software Engineering, Separation of Concerns, Model-Driven Architecture, and Aspect-Oriented Programming are four active research areas that have been around for s...
Raul Silaghi, Alfred Strohmeier
ICRA
1999
IEEE
201views Robotics» more  ICRA 1999»
15 years 2 months ago
ARMAR: An Anthropomorphic Arm for Humanoid Service Robot
Service robots which should perform human-like operation will penetrate into a great number of applications in the future. Requirements for this is high flexibility, autonomy and ...
Karsten Berns, Tamim Asfour, Rüdiger Dillmann