Sciweavers

543 search results - page 65 / 109
» Controlling gaze with an embodied interactive control archit...
Sort
View
EUROMICRO
1999
IEEE
15 years 4 months ago
Enhancing Security in the Memory Management Unit
We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software pri...
Tanguy Gilmont, Jean-Didier Legat, Jean-Jacques Qu...
SMC
2007
IEEE
167views Control Systems» more  SMC 2007»
15 years 6 months ago
The inherent components of unmanned vehicle situation awareness
—The purpose of this paper is to present an initial delineation of the inherent components required for unmanned vehicles to possess situation awareness. A broadly adapted human ...
Sanford T. Freedman, Julie A. Adams
CACM
2008
84views more  CACM 2008»
14 years 12 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...
SPAA
2003
ACM
15 years 5 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
CIDR
2009
167views Algorithms» more  CIDR 2009»
15 years 28 days ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...