Sciweavers

2805 search results - page 459 / 561
» Modeling Memory for Melodies
Sort
View
PERVASIVE
2009
Springer
15 years 4 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
TACAS
2009
Springer
131views Algorithms» more  TACAS 2009»
15 years 4 months ago
Verifying Reference Counting Implementations
Reference counting is a widely-used resource management idiom which maintains a count of references to each resource by incrementing the count upon an acquisition, and decrementing...
Michael Emmi, Ranjit Jhala, Eddie Kohler, Rupak Ma...
VMCAI
2009
Springer
15 years 4 months ago
Finding Concurrency-Related Bugs Using Random Isolation
This paper describes the methods used in Empire, a tool to detect concurrency-related bugs, namely atomic-set serializability violations in Java programs. The correctness criterion...
Nicholas Kidd, Thomas W. Reps, Julian Dolby, Manda...
CSE
2009
IEEE
15 years 4 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
DATE
2009
IEEE
128views Hardware» more  DATE 2009»
15 years 4 months ago
A case study in distributed deployment of embedded software for camera networks
—We present an embedded software application for the real-time estimation of building occupancy using a network of video cameras. We analyze a series of alternative decomposition...
Francesco Leonardi, Alessandro Pinto, Luca P. Carl...