The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to increasing semiconductor design complexity, more errors are escaping presilicon verification and being discovered only after manufacturing. As an alternative to traditional manual chip repair, the authors propose the FogClear methodology, which automates the postsilicon debugging process and thereby reduces IC development time and costs.
SIISAM is a multilayered, Web-service-based architecture model designed to guide construction of a secure, interoperable, and extensible information system that allows smooth interoperation of legacy applications. A pilot e-government system in China built using the model has achieved its targets in both functionality and performance.
Femtocells help eliminate spotty mobile phone reception indoors by connecting users to the wireless network via broadband Internet links, not the telephony infrastructure.
The globalization of business through mergers and acquisitions requires the interoperation of established heterogeneous systems within the enterprise. Supply-chain management and collaboration between companies likewise necessitate interoperation between enterprise systems. Companies must break down system silos to increase utilization rates. Automated contract management can mitigate the risks of...
Hacking might occupy a special position-that gray area between the darkness and the light-because it touches not only on ethical issues but also on the very nature of computing itself. Beyond the topics under discussion, all of which concerned how to exploit the flaws of commercial software, the conference strayed from its more conventional cousins in the exhibits room. The hacking community, for...
The academic programming language community continues to reject the change in programming practices brought about by scripting. We need a programming language pragmatics to go past the analysis of syntax and semantics in the same way that linguistics studies perlocution and illocution. Pragmatic questions are not the easiest for mathematically inclined computer scientists to address. They refer by...
Application-aware storage offers a technology that can respond intelligently and quickly enough for organizations to meet the demands of their different users and programs.
A university team has developed a technique that uses large groups of computers, such as those in many existing networks, to defeat botnets, which are large groups of computers that hackers infect and commandeer to launch spam, distributed denial-of- service, and other attacks. The University of Washington researchers say their Phalanx system would be relatively inexpensive to implement and could...
One of the many areas in which embedded systems show great promise is assistive technologies, which address the special needs of those with impairments. This article presents HandTalk, a "smart glove" that can recognize basic hand gestures and convert them into speech using low-cost, commercial off-the-shelf (COTS) components. A low-cost, portable gesture-to-speech glove prototype demonstrates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.