Sciweavers

7080 search results - page 1151 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
ICRA
2005
IEEE
104views Robotics» more  ICRA 2005»
15 years 9 months ago
RehAbilitative Knee Orthosis Driven by Electro-Rheological Fluid Based Actuators
- This work aims to demonstrate the feasibility of using Electro-Rheological Fluid (ERF) actuators in orthotics, creating a new breed of rehabilitation devices. ERFs are fluids tha...
Jason Nikitczuk, Brian Weinberg, Constantinos Mavr...
DM
2006
128views more  DM 2006»
15 years 4 months ago
Non-trivial t-designs without repeated blocks exist for all t
A computer package is being developed at Bayreuth for the generation and investigation of discrete structures. The package is a C and C++ class library of powerful algorithms endow...
Luc Teirlinck
CCS
2009
ACM
15 years 10 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ISLPED
2009
ACM
184views Hardware» more  ISLPED 2009»
15 years 10 months ago
Online work maximization under a peak temperature constraint
Increasing power densities and the high cost of low thermal resistance packages and cooling solutions make it impractical to design processors for worst-case temperature scenarios...
Thidapat Chantem, Xiaobo Sharon Hu, Robert P. Dick
DASC
2006
IEEE
15 years 10 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
« Prev « First page 1151 / 1416 Last » Next »