Sciweavers

3516 search results - page 378 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
136
Voted
SCAI
2008
15 years 6 months ago
Modeling Habituation in the Cnidarian Hydra
Abstract. In the design of behavior-based control architectures for robots it is common to use biology as inspiration, and often the observed functionalities of insect behaviors ar...
Malin Aktius, Mats Nordahl, Tom Ziemke
128
Voted
DATE
2005
IEEE
135views Hardware» more  DATE 2005»
15 years 10 months ago
Compositional Memory Systems for Multimedia Communicating Tasks
Conventional cache models are not suited for real-time parallel processing because tasks may flush each other’s data out of the cache in an unpredictable manner. In this way th...
Anca Mariana Molnos, Marc J. M. Heijligers, Sorin ...
168
Voted
RTAS
2010
IEEE
15 years 2 months ago
Middleware for Resource-Aware Deployment and Configuration of Fault-Tolerant Real-time Systems
Developing large-scale distributed real-time and embedded (DRE) systems is hard in part due to complex deployment and configuration issues involved in satisfying multiple quality f...
Jaiganesh Balasubramanian, Aniruddha S. Gokhale, A...
AIED
2007
Springer
15 years 10 months ago
Pedagogical Agents Trying on a Caring Mentor Role
: We describe the design and evaluation of an affective pedagogical agent persona for Intelligent Tutoring Systems. The goal of our research was to develop an agent embodying a per...
Konstantin Zakharov, Antonija Mitrovic, Lucy Johns...
ASIACRYPT
2000
Springer
15 years 9 months ago
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
Abstract. Construction of secure hyperelliptic curves is of most important yet most difficult problem in design of cryptosystems based on the discrete logarithm problems on hyperel...
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shig...