Sciweavers

2361 search results - page 460 / 473
» Embedded Systems - Challenges and Work Directions
Sort
View
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
15 years 2 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
IMC
2003
ACM
15 years 2 months ago
On inferring and characterizing internet routing policies
Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although ...
Feng Wang, Lixin Gao
MM
2003
ACM
113views Multimedia» more  MM 2003»
15 years 2 months ago
R-Histogram: quantitative representation of spatial relations for similarity-based image retrieval
Representation of relative spatial relations between objects is required in many multimedia database applications. Quantitative representation of spatial relations taking into acc...
Yuhang Wang, Fillia Makedon
PLDI
2003
ACM
15 years 2 months ago
CCured in the real world
CCured is a program transformation system that adds memory safety guarantees to C programs by verifying statically that memory errors cannot occur and by inserting run-time checks...
Jeremy Condit, Matthew Harren, Scott McPeak, Georg...
WPES
2003
ACM
15 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett