Sciweavers

1358 search results - page 242 / 272
» Diverse Firewall Design
Sort
View
98
Voted
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 6 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
15 years 6 months ago
Internet-Router Buffered Crossbars Based on Networks on Chip
—The scalability and performance of the Internet depends critically on the performance of its packet switches. Current packet switches are based on single-hop crossbar fabrics, w...
Kees Goossens, Lotfi Mhamdi, Iria Varela Senin
ICRA
2009
IEEE
140views Robotics» more  ICRA 2009»
15 years 6 months ago
1000 Trials: An empirically validated end effector that robustly grasps objects from the floor
—Unstructured, human environments present great challenges and opportunities for robotic manipulation and grasping. Robots that reliably grasp household objects with unknown or u...
Zhe Xu, Travis Deyle, Charles C. Kemp
INFOCOM
2009
IEEE
15 years 6 months ago
Mobility-Driven Scheduling in Wireless Networks
—The design of scheduling policies for wireless data systems has been driven by a compromise between the objectives of high overall system throughput and the degree of fairness a...
Sem C. Borst, Nidhi Hegde, Alexandre Proutiere
BTW
2009
Springer
138views Database» more  BTW 2009»
15 years 6 months ago
GEM: A Generic Visualization and Editing Facility for Heterogeneous Metadata
: Many model management tasks, e.g., schema matching or merging, require the manual handling of metadata. Given the diversity of metadata, its many different representations and mo...
Jürgen Göres, Thomas Jörg, Boris St...