Sciweavers

3516 search results - page 571 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
VRML
2004
ACM
15 years 9 months ago
PathSim visualizer: an Information-Rich Virtual Environment framework for systems biology
Increasingly, biology researchers and medical practitioners are using computational tools to model and analyze dynamic systems across scales from the macro to the cellular to the ...
Nicholas F. Polys, Doug A. Bowman, Chris North, Re...
MOBISYS
2008
ACM
16 years 3 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 28 days ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
OOPSLA
2009
Springer
15 years 10 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and efï¬...
Damian Dechev, Bjarne Stroustrup
IJRR
2000
129views more  IJRR 2000»
15 years 3 months ago
Development and Control of a Holonomic Mobile Robot for Mobile Manipulation Tasks
International Journal of Robotics Research, v 19, n 11, p. 1066-1074 Mobile manipulator systems hold promise in many industrial and service applications including assembly, inspec...
Robert Holmberg, Oussama Khatib