Sciweavers

8655 search results - page 1341 / 1731
» Challenges for Trusted Computing
Sort
View
LCN
2003
IEEE
15 years 9 months ago
Scheduling Resources in Programmable and Active Networks Based on Adaptive Estimations
In active and programmable networks, packet processing could be accomplished in the router within the data path. For efficient resource allocation in such networks, the packet sch...
Fariza Sabrina, Sanjay Jha
LICS
2003
IEEE
15 years 9 months ago
Model checking for probability and time: from theory to practice
Probability features increasingly often in software and hardware systems: it is used in distributed co-ordination and routing problems, to model fault-tolerance and performance, a...
Marta Z. Kwiatkowska
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
15 years 9 months ago
Runtime Power Monitoring in High-End Processors: Methodology and Empirical Data
With power dissipation becoming an increasingly vexing problem across many classes of computer systems, measuring power dissipation of real, running systems has become crucial for...
Canturk Isci, Margaret Martonosi
PG
2003
IEEE
15 years 9 months ago
Motion Perturbation Based on Simple Neuromotor Control Models
Motion capture is widely used for character animation. One of the major challenges of this technique is how to modify the captured motion in plausible ways. Previous work has focu...
KangKang Yin, Michael B. Cline, Dinesh K. Pai
RTCSA
2003
IEEE
15 years 9 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...
« Prev « First page 1341 / 1731 Last » Next »