Sciweavers

4820 search results - page 380 / 964
» Implementing Signatures for C
Sort
View
RTSS
2002
IEEE
15 years 9 months ago
Improving Quality-of-Control Using Flexible Timing Constraints: Metric and Scheduling Issues
Closed-loop control systems are dynamic systems subject to perturbations. One of the main concerns of the control is to design controllers to correct or limit the deviation that t...
Pau Martí, Josep M. Fuertes, Gerhard Fohler...
MFCS
1995
Springer
15 years 8 months ago
An Abstract Account of Composition
act Account of Composition Mart n Abadi1 and Stephan Merz2 1 Digital Equipment Corporation, Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, U.S.A. 2 Institut fur I...
Martín Abadi, Stephan Merz
BIOID
2008
149views Biometrics» more  BIOID 2008»
15 years 6 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
145
Voted
CONEXT
2009
ACM
15 years 5 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
INTERNET
2002
175views more  INTERNET 2002»
15 years 4 months ago
Web Services Interaction Models, Part 1: Current Practice
of abstractions a middleware system makes available to applications, they figure prominently in determining the breadth and variety of application integration that the middleware s...
Steve Vinoski