Sciweavers

977 search results - page 30 / 196
» Soft Constraints for Security
Sort
View
IANDC
2008
74views more  IANDC 2008»
14 years 10 months ago
Execution monitoring enforcement under memory-limitation constraints
Recently, attention has been given to formally characterize security policies that are enforceable by different kinds of security mechanisms. A very important research problem is ...
Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi
CASES
2006
ACM
15 years 1 months ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
SMI
2006
IEEE
122views Image Analysis» more  SMI 2006»
15 years 3 months ago
A Constrained Least Squares Approach to Interactive Mesh Deformation
In this paper, we propose a constrained least squares approach for stably computing Laplacian deformation with strict positional constraints. In the existing work on Laplacian def...
Yasuhiro Yoshioka, Hiroshi Masuda, Yoshiyuki Furuk...
DATE
2007
IEEE
79views Hardware» more  DATE 2007»
15 years 4 months ago
Utilization of SECDED for soft error and variation-induced defect tolerance in caches
Combination of SECDED with a redundancy technique can effectively tolerate a high variation-induced defect rate in future processes. However, while a defective cell in a block can...
Luong Dinh Hung, Hidetsugu Irie, Masahiro Goshima,...
IROS
2006
IEEE
149views Robotics» more  IROS 2006»
15 years 3 months ago
Tactile Measurement of Local Contact Geometry Using Soft Fingertip with Force/Torque Sensor
— We propose a new method of tactile sensing for a fingertip of robotic hand based on the analysis of the mechanical constraints imposed to the contact between the fingertip an...
Kouji Murakami, Tsutomu Hasegawa