Sciweavers

4118 search results - page 778 / 824
» Mechanisms for usage control
Sort
View
ICNP
2006
IEEE
15 years 5 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
IEEEPACT
2006
IEEE
15 years 5 months ago
Overlapping dependent loads with addressless preload
Modern out-of-order processors with non-blocking caches exploit Memory-Level Parallelism (MLP) by overlapping cache misses in a wide instruction window. The exploitation of MLP, h...
Zhen Yang, Xudong Shi, Feiqi Su, Jih-Kwon Peir
IROS
2006
IEEE
231views Robotics» more  IROS 2006»
15 years 5 months ago
MMALV - The Morphing Micro Air-Land Vehicle
– A sensor platform has been developed that is capable of both aerial and terrestrial locomotion, as well as transitioning between the two. The Morphing Micro Air-Land Vehicle (M...
Kevin Jones, Frank Boria, Richard J. Bachmann, Rav...
IROS
2006
IEEE
116views Robotics» more  IROS 2006»
15 years 5 months ago
On the Importance of Asymmetries in Grasp Quality Metrics for Tendon Driven Hands
Abstract— Grasp quality measures are important for understanding how to plan for and maintain appropriate and secure grasps for pick and place operations and tool use. Most grasp...
Jiaxin L. Fu, Nancy S. Pollard
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
15 years 5 months ago
ASR: Adaptive Selective Replication for CMP Caches
The large working sets of commercial and scientific workloads stress the L2 caches of Chip Multiprocessors (CMPs). Some CMPs use a shared L2 cache to maximize the on-chip cache c...
Bradford M. Beckmann, Michael R. Marty, David A. W...