Sciweavers

1264 search results - page 34 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
109
Voted
ICCL
1998
IEEE
15 years 6 months ago
Transactions for Java
We present a design and implementation of transactions and general-purpose persistence for Java. These additions allow Java programmers to manipulate any Java object using transac...
Alex Garthwaite, Scott Nettles
109
Voted
ATAL
2008
Springer
15 years 3 months ago
Synchronization protocols for reliable communication in fully distributed agent systems
In order to prevent misunderstandings within groups of interacting agents, it is necessary to ensure that the agents' beliefs regarding the overall state of the interaction a...
Hywel R. Dunn-Davies, Jim Cunningham, Shamimabi Pa...
ROMAN
2007
IEEE
139views Robotics» more  ROMAN 2007»
15 years 8 months ago
Tele-operation of a Mobile Robot Using a Force Reflection Joystick with a Single Hall Sensor
—Though the final goal of mobile robot navigation is to be autonomous, operators’ intelligent and skillful decisions are necessary when there are many scattered obstacles. Ther...
Soonshin Han, JangMyung Lee
121
Voted
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
14 years 12 months ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson
VLDB
2012
ACM
360views Database» more  VLDB 2012»
13 years 9 months ago
An adaptive updating protocol for reducing moving object database workload
In the last decade, spatio-temporal database research focuses on the design of effective and efficient indexing structures in support of location-based queries such as predictive...
Su Chen, Beng Chin Ooi, Zhenjie Zhang