Sciweavers

1192 search results - page 222 / 239
» Computing Weakest Readings
Sort
View
SOUPS
2009
ACM
15 years 8 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
CDC
2008
IEEE
128views Control Systems» more  CDC 2008»
15 years 8 months ago
Time-robust discrete control over networked Loosely Time-Triggered Architectures
In this paper we consider Loosely Time-Triggered Architectures (LTTA) as a networked infrastructure for deploying discrete control. LTTA are distributed architectures in which 1/ ...
Paul Caspi, Albert Benveniste
131
Voted
ISCA
2008
IEEE
142views Hardware» more  ISCA 2008»
15 years 8 months ago
Improving NAND Flash Based Disk Caches
Flash is a widely used storage device that provides high density and low power, appealing properties for general purpose computing. Today, its usual application is in portable spe...
Taeho Kgil, David Roberts, Trevor N. Mudge
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 8 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
132
Voted
ICRA
2007
IEEE
524views Robotics» more  ICRA 2007»
15 years 8 months ago
Concept and Design of A Fully Autonomous Sewer Pipe Inspection Mobile Robot "KANTARO"
— In current conventional method, the sewer pipe inspection is undertaken using a cable-tethered robot with an on-board video camera system, completely, tele-operated by human op...
Amir Ali Forough Nassiraei, Yoshinori Kawamura, Al...