Sciweavers

2513 search results - page 358 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
165
Voted
SIAMJO
2011
14 years 5 months ago
Recovering Low-Rank and Sparse Components of Matrices from Incomplete and Noisy Observations
Many applications arising in a variety of fields can be well illustrated by the task of recovering the low-rank and sparse components of a given matrix. Recently, it is discovered...
Min Tao, Xiaoming Yuan
TASE
2011
IEEE
14 years 5 months ago
A Totally Decoupled Piezo-Driven XYZ Flexure Parallel Micropositioning Stage for Micro/Nanomanipulation
—This paper reports the design and development processes of a totally decoupled flexure-based XYZ parallel-kinematics micropositioning stage with piezoelectric actuation. The un...
Yangmin Li, Qingsong Xu
102
Voted
NDSS
2003
IEEE
15 years 3 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
95
Voted
ICES
2003
Springer
111views Hardware» more  ICES 2003»
15 years 3 months ago
Spiking Neural Networks for Reconfigurable POEtic Tissue
Abstract. Vertebrate and most invertebrate organisms interact with their environment through processes of adaptation and learning. Such processes are generally controlled by comple...
Jan Eriksson, Oriol Torres, Andrew Mitchell, Gayle...
87
Voted
WAC
2004
Springer
15 years 3 months ago
A Metabolic Approach to Protocol Resilience
The goal of this research is to create robust execution circuits for communication software which can distribute over a network and which continues to provide its service despite p...
Christian F. Tschudin, Lidia Yamamoto