Sciweavers

1998 search results - page 377 / 400
» Situated Control Rules
Sort
View
CCS
2008
ACM
15 years 3 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
106
Voted
ASAP
2007
IEEE
112views Hardware» more  ASAP 2007»
15 years 3 months ago
Scheduling Register-Allocated Codes in User-Guided High-Level Synthesis
In high-level synthesis, as for compilers, an important question is when register assignment should take place. Unlike compilers for which the processor architecture is given, syn...
Alain Darte, C. Quinson
SCAI
2008
15 years 3 months ago
Sharing Moral Responsibility with Robots: A Pragmatic Approach
Roboethics is a recently developed field of applied ethics which deals with the ethical aspects of technologies such as robots, ambient intelligence, direct neural interfaces and i...
Gordana Dodig-Crnkovic, Daniel Persson
SNPD
2008
15 years 3 months ago
An Approach to Modeling Software Safety
: Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. Software safety is a co...
M. Ben Swarup, P. Seetha Ramaiah
142
Voted
DAGSTUHL
2006
15 years 3 months ago
Cognitive Vision Needs Attention to Link Sensing with Recognition
Abstract. "Cognitive computer vision is concerned with integration and control of vision systems using explicit but not necessarily symbolic models of context, situation and g...
John K. Tsotsos