Sciweavers

637 search results - page 86 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
CCS
2008
ACM
15 years 3 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
ECAI
2008
Springer
15 years 3 months ago
Incremental Component-Based Construction and Verification of a Robotic System
Abstract-- Autonomous robots are complex systems that require the interaction/cooperation of numerous heterogeneous software components. Nowadays, robots are critical systems and m...
Ananda Basu, Matthieu Gallien, Charles Lesire, Tha...
LREC
2008
114views Education» more  LREC 2008»
15 years 3 months ago
UFRA: a UIMA-based Approach to Federated Language Resource Architecture
In this paper we address the issue of developing an interoperable infrastructure for language resources and technologies. In our approach, called UFRA, we extend the Federate Data...
Riccardo Del Gratta, Roberto Bartolini, Tommaso Ca...
FLAIRS
2004
15 years 3 months ago
Reasoning on Spatial Constraints over Regions
We discuss description and reasoning over regions. We have proposed a system called SRCC that integrates integration of spatial and semantic data. SRCC can describe and reason abo...
Kazuko Takahashi
VIIP
2001
15 years 3 months ago
Parallel Detection of Closed Streamlines in Planar Flows
Closed streamlines are an integral part of vector field topology, since they behave like sources respectively sinks but are often neither considered nor detected. If a streamline ...
Thomas Wischgoll, Gerik Scheuermann, Hans Hagen