Sciweavers

314 search results - page 57 / 63
» Social Software and the Emergence of Control
Sort
View
ICSE
2007
IEEE-ACM
15 years 9 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
AVI
2006
14 years 11 months ago
The ASPICE project: inclusive design for the motor disabled
The ASPICE project aims at the development of a system which allows the neuromotor disabled persons to improve or recover their mobility (directly or by emulation) and communicati...
Fabio Aloise, Febo Cincotti, Fabio Babiloni, Maria...
ISF
2006
118views more  ISF 2006»
14 years 9 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
CANDC
2005
ACM
14 years 11 months ago
Computational schemes for biomimetic sculpture
A prototype system for the automatic evolution of biomimetic structures using structural automata is described and its utility for generating digital sculpture is demonstrated. Sc...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 2 months ago
ERSA: Error Resilient System Architecture for probabilistic applications
There is a growing concern about the increasing vulnerability of future computing systems to errors in the underlying hardware. Traditional redundancy techniques are expensive for...
Larkhoon Leem, Hyungmin Cho, Jason Bau, Quinn A. J...