Sciweavers

5109 search results - page 1003 / 1022
» On Learning Limiting Programs
Sort
View
100
Voted
JFR
2010
94views more  JFR 2010»
14 years 7 months ago
Passive sensor evaluation for unmanned ground vehicle mud detection
Detecting mud hazards is a significant challenge to unmanned ground vehicle (UGV) autonomous offroad navigation. A military UGV stuck in a mud body during a mission may need to be...
Arturo L. Rankin, Larry H. Matthies
109
Voted
MICRO
2010
IEEE
202views Hardware» more  MICRO 2010»
14 years 7 months ago
Hardware Support for Relaxed Concurrency Control in Transactional Memory
Today's transactional memory systems implement the two-phase-locking (2PL) algorithm which aborts transactions every time a conflict happens. 2PL is a simple algorithm that pr...
Utku Aydonat, Tarek S. Abdelrahman
TDSC
2010
119views more  TDSC 2010»
14 years 7 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
TWC
2010
14 years 7 months ago
Lifetime-resource tradeoff for multicast traffic in wireless sensor networks
In this paper, we study the problem of supporting multicast traffic in wireless sensor networks with network coding. On one hand, coding operations can reduce power consumption and...
Vahid Shah-Mansouri, Vincent W. S. Wong
FCCM
1999
IEEE
210views VLSI» more  FCCM 1999»
15 years 4 months ago
Algorithm Analysis and Mapping Environment for Adaptive Computing Systems: Further Results
Abstract We are developing an integrated algorithm analysis and mapping environment particularly tailored for signal processing applications on Adaptive Computing Systems ACS. Our ...
Eric K. Pauer, Paul D. Fiore, John M. Smith
« Prev « First page 1003 / 1022 Last » Next »