The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
Force control implemented by a passive mechanical device (perhaps a wrist) has inherent advantages over active implementations. A passive mechanical device can regain some of the ...
Data, addresses, and instructions are compressed by maintaining only significant bytes with two or three extension bits appended to indicate the significant byte positions. This s...
Abstract— This paper describes a work in progress on a multisensor system for 3D data acquisition. The system core structure is a 3D-range scan based on the well known active tri...
Microprocessor trends are moving towards wider architectures and more aggressive speculation. With the increasing transistor budgets, energy consumption has become a critical desi...