Sciweavers

203 search results - page 17 / 41
» Quantale Modules and their Operators, with Applications
Sort
View
IPSN
2007
Springer
15 years 3 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
ISER
2000
Springer
82views Robotics» more  ISER 2000»
15 years 1 months ago
Towards a Team of Robots with Repair Capabilities: A Visual Docking System
: In the future, we propose that there will be largely self-sufficient robot colonies operating on distant planets and in harsh environments here on earth. A highly desirable quali...
Curt A. Bererton, Pradeep K. Khosla
IPPS
2007
IEEE
15 years 4 months ago
Client-Side Implementation of Dynamic Asynchronous Invocations for Web Services
Web Services are becoming more and more fundamental building blocks of Web-based distributed applications and a core technology for Grid systems. Due to their flexibility, Web Ser...
Giancarlo Tretola, Eugenio Zimeo
VLSID
2007
IEEE
130views VLSI» more  VLSID 2007»
15 years 10 months ago
Memory Architecture Exploration for Power-Efficient 2D-Discrete Wavelet Transform
The Discrete Wavelet Transform (DWT) forms the core of the JPEG2000 image compression algorithm. Since the JPEG2000 compression application is heavily data-intensive, the overall ...
Rahul Jain, Preeti Ranjan Panda
NDSS
2009
IEEE
15 years 4 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...