Sciweavers

1353 search results - page 155 / 271
» Securing Current and Future Process Control Systems
Sort
View
220
Voted
VLDB
2005
ACM
177views Database» more  VLDB 2005»
16 years 3 months ago
Indexing mobile objects using dual transformations
With the recent advances in wireless networks, embedded systems and GPS technology, databases that manage the location of moving objects have received increased interest. In this ...
George Kollios, Dimitris Papadopoulos, Dimitrios G...
105
Voted
SP
1989
IEEE
15 years 7 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
134
Voted
FPL
2004
Springer
110views Hardware» more  FPL 2004»
15 years 9 months ago
Versatile Imaging Architecture Based on a System on Chip
Abstract. In this paper, a novel architecture dedicated to image processing is presented. The most original aspect of the approach is the use of a System On Chip implemented in a F...
Pierre Chalimbaud, François Berry
124
Voted
ICRA
2010
IEEE
116views Robotics» more  ICRA 2010»
15 years 1 months ago
Using logic to handle conflicts between system, component, and infrastructure goals in complex robotic architectures
Abstract-- Complex robots with many interacting components in their control architectures are subject to component failures from which neither the control architecture nor the impl...
Paul W. Schermerhorn, Matthias Scheutz
128
Voted
MSS
2005
IEEE
136views Hardware» more  MSS 2005»
15 years 9 months ago
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redund
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emer...
Joseph Tucek, Paul Stanton, Elizabeth Haubert, Rag...