Sciweavers

2516 search results - page 410 / 504
» Integrity Constraints for XML
Sort
View
HOST
2008
IEEE
15 years 4 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
ICRA
2008
IEEE
194views Robotics» more  ICRA 2008»
15 years 4 months ago
A new variable stiffness design: Matching requirements of the next robot generation
— Facing new tasks, the conventional rigid design of robotic joints has come to its limits. Operating in unknown environments current robots are prone to failure when hitting unf...
Sebastian Wolf, Gerd Hirzinger
ISVLSI
2008
IEEE
173views VLSI» more  ISVLSI 2008»
15 years 4 months ago
System Level Design Space Exploration for Multiprocessor System on Chip
Future embedded systems will integrate hundreds of processors. Current design space exploration methods cannot cope with such a complexity. It is mandatory to extend these methods...
Issam Maalej, Guy Gogniat, Jean Luc Philippe, Moha...
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
15 years 4 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
SSDBM
2008
IEEE
90views Database» more  SSDBM 2008»
15 years 4 months ago
Ontology Database: A New Method for Semantic Modeling and an Application to Brainwave Data
We propose an automatic method for modeling a relational database that uses SQL triggers and foreign-keys to efficiently answer positive semantic queries about ground instances for...
Paea LePendu, Dejing Dou, Gwen A. Frishkoff, Jiawe...