Sciweavers

1054 search results - page 171 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
ICRA
2002
IEEE
93views Robotics» more  ICRA 2002»
15 years 7 months ago
Combining Haptic and Visual Servoing for Cardiothoracic Surgery
Cardiovascular disease is one of the leading causes of death in the United States and also a major disease worldwide with over 700,000 coronary artery bypass graft (CABG) procedur...
Christopher W. Kennedy, Tie Hu, Jaydev P. Desai
GPCE
2009
Springer
15 years 6 months ago
A language and framework for invariant-driven transformations
This paper describes a language and framework that allow coordinated transformations driven by invariants to be specified declaratively, as invariant rules, and applied automatic...
Yanhong A. Liu, Michael Gorbovitski, Scott D. Stol...
INFOCOM
1999
IEEE
15 years 6 months ago
Scalable Flow Control for Multicast ABR Services
We propose a flow-control scheme for multicast ABR services in ATM networks. At the heart of the proposed scheme is an optimal secondorder rate control algorithm, called the -contr...
Xi Zhang, Kang G. Shin, Debanjan Saha, Dilip D. Ka...
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 6 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
DSN
2007
IEEE
15 years 5 months ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...