Sciweavers

281 search results - page 24 / 57
» Comparing operational models of name-passing process calculi
Sort
View
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 3 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
ICASSP
2010
IEEE
14 years 12 months ago
Multiple Selection Approximation for improved spatio-temporal prediction in video coding
In this contribution, a novel spatio-temporal prediction algorithm for video coding is introduced. This algorithm exploits temporal as well as spatial redundancies for effectively...
Jürgen Seiler, André Kaup
DAC
2008
ACM
16 years 24 days ago
The mixed signal optimum energy point: voltage and parallelism
An energy optimization is proposed that addresses the nontrivial digital contribution to power and impact on performance in high-speed mixed-signal circuits. Parallel energy and b...
Brian P. Ginsburg, Anantha P. Chandrakasan
ICAI
2009
14 years 9 months ago
Expectancy-Based Robot Localization Through Context Evaluation
Agents that operate in a real-world environment have to process an abundance of information, which may be ambiguous or noisy. We present a method inspired by cognitive research tha...
Maria E. Niessen, Gert Kootstra, Sjoerd de Jong, T...
AC
1999
Springer
15 years 4 months ago
Integrating Group Communication with Transactions for Implementing Persistent Replicated Objects
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Mark C. Little, Santosh K. Shrivastava