Sciweavers

8600 search results - page 1437 / 1720
» Measuring with Timed Patterns
Sort
View
APGV
2006
ACM
111views Visualization» more  APGV 2006»
15 years 7 months ago
Discrimination and estimation of time-to-contact for approaching traffic using a desktop environment
Each year, thousands of pedestrians are injured or killed in traffic accidents. Identifying pedestrians' perceptual capabilities for street crossing decisions is an important...
A. Elizabeth Seward, Daniel H. Ashmead, Bobby Bode...
121
Voted
COMPSAC
2004
IEEE
15 years 7 months ago
Robustness Study of an Embedded Operating System for Industrial Applications
Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour in spite of the appearance of errors. ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
CSB
2004
IEEE
113views Bioinformatics» more  CSB 2004»
15 years 7 months ago
Shannon Information in Complete Genomes
Shannon information in the genomes of all completely sequenced prokaryotes and eukaryotes are measured in word lengths of two to ten letters. It is found that in a scale-dependent...
Chang-Heng Chang, Li-Ching Hsieh, Ta-Yuan Chen, Ho...
136
Voted
CSMR
2004
IEEE
15 years 7 months ago
Using History Information to Improve Design Flaws Detection
1 As systems evolve and their structure decays, maintainers need accurate and automatic identification of the design problems. Current approaches for automatic detection of design...
Daniel Ratiu, Stéphane Ducasse, Tudor G&ici...
148
Voted
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
15 years 7 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
« Prev « First page 1437 / 1720 Last » Next »