Sciweavers

5451 search results - page 176 / 1091
» Typed Operational Semantics
Sort
View
PIMRC
2008
IEEE
15 years 10 months ago
Performance metrics for analysis of operator benefits of network cooperation in multi-operator scenarios
—Wide spread adoption of mobile Internet services will increase the demand for low cost high capacity wireless networks. Cooperation between different types of operators will ena...
Jan Markendahl, Petteri Poyhonen, Ove Strandberg
USENIX
2000
15 years 5 months ago
Techniques for the Design of Java Operating Systems
Language-basedextensible systems, such as Java Virtual Machines and SPIN, use type safety to provide memory safety in a single address space. By using software to provide safety, ...
Godmar Back, Patrick Tullmann, Leigh Stoller, Wils...
ASPLOS
2011
ACM
14 years 7 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
IRI
2006
IEEE
15 years 9 months ago
Targeting and localization for mars rover operations
— In this work we discuss how the quality of localization knowledge impacts the remote operation of rovers on the surface of Mars. We look at the techniques of localization estim...
Mark W. Powell, Thomas Crockett, Jason Fox, Joseph...
JMM2
2008
127views more  JMM2 2008»
15 years 3 months ago
Texture Segmentation Methods Based on Combinatorial of Morphological and Statistical Operations
In this paper we introduce a novel and simple image segmentation schemes that are based on combinations of morphological and statistical operations. Mathematical morphology is very...
Vakulabharanam Vijaya Kumar, B. Eswara Reddy, A. N...