Sciweavers

10396 search results - page 1922 / 2080
» Deployment Support Network
Sort
View
CSFW
2000
IEEE
15 years 5 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
HIPC
2000
Springer
15 years 5 months ago
Applying Patterns to Improve the Performance of Fault Tolerant CORBA
An increasing number of mission-critical, embedded, telecommunications, and financial distributed systems are being developed using distributed object computing middleware, such a...
Balachandran Natarajan, Aniruddha S. Gokhale, Shal...
ISER
2000
Springer
88views Robotics» more  ISER 2000»
15 years 5 months ago
Design, Implementation, and Remote Operation of the Humanoid H6
Abstract: The paper describes the humanoid robot \H6", which was designed to serve as a platform for experimental research on the development of advanced humanoid-type robots....
Satoshi Kagami, Koichi Nishiwaki, James J. Kuffner...
DL
1995
Springer
120views Digital Library» more  DL 1995»
15 years 5 months ago
A New Zealand Digital Library for Computer Science Research
: A large amount of computing literature has become available over the Internet, as university departments and research institutions have made their technical reports, preprints, a...
Ian H. Witten, Sally Jo Cunningham, Mahendra Valla...
ICCAD
1995
IEEE
144views Hardware» more  ICCAD 1995»
15 years 5 months ago
Background memory management for dynamic data structure intensive processing systems
Abstract -- Telecommunication network management applications often require application-specific ICs that use large dynamically allocated stored data structures. Currently availab...
Gjalt G. de Jong, Bill Lin, Carl Verdonck, Sven Wu...
« Prev « First page 1922 / 2080 Last » Next »