Sciweavers

1264 search results - page 84 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
SAS
1993
Springer
139views Formal Methods» more  SAS 1993»
15 years 8 months ago
Compiling FX on the CM-2
Type and effect systems provide a safe and effective means of programming high-performance parallel computers with a high-level language that integrates both functional and impe...
Jean-Pierre Talpin, Pierre Jouvelot
CASES
2004
ACM
15 years 10 months ago
Memory overflow protection for embedded systems using run-time checks, reuse and compression
Title of thesis: MEMORY OVERFLOW PROTECTION FOR EMBEDDED SYSTEMS USING RUN-TIME CHECKS, REUSE AND COMPRESSION Surupa Biswas, Master of Science, 2004 Thesis directed by: Assistant ...
Surupa Biswas, Matthew Simpson, Rajeev Barua
146
Voted
ICPP
2007
IEEE
15 years 10 months ago
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...
Souvik Ray, Giora Slutzki, Zhao Zhang
IROS
2007
IEEE
128views Robotics» more  IROS 2007»
15 years 10 months ago
A modular robotic system using magnetic force effectors
— One of the primary impediments to building ensembles with many modular robots is the complexity and number of mechanical mechanisms used to construct the individual modules. As...
Brian T. Kirby, Burak Aksak, Jason Campbell, James...
SAJ
2002
97views more  SAJ 2002»
15 years 4 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier