搜索结果: 1-15 共查到“知识库 操作系统与操作环境”相关记录319条 . 查询时间(2.703 秒)
内蒙古农业大学机电工程学院2022年春季学期线上教学典型案例(一)——《嵌入式系统》-刘海洋(图)
内蒙古农业大学机电工程学院 春季学期 教学典型案例 嵌入式系统 刘海洋
font style='font-size:12px;'>
2023/2/16
Video-Based Document Tracking: Unifying Your Physical and Electronic Desktops
Your Physical Electronic Desktops
font style='font-size:12px;'>
2016/5/24
This paper presents an approach for tracking paper documents
on the desk over time and automatically linking them
to the corresponding electronic documents using an overhead
video camera. We demons...
Digital Photography with Flash and No-Flash Image Pairs
Flash No-Flash Image Pairs
font style='font-size:12px;'>
2016/5/24
Digital photography has made it possible to quickly and easily
take a pair of images of low-light environments: one with flash to
capture detail and one without flash to capture ambient illumination...
Physically-Based Manipulation on the Responsive Workbench
Responsive Workbench Physically-Based Manipulation
font style='font-size:12px;'>
2016/5/24
This paper describes how a physical simulation can be
integrated with our Responsive Workbench system to support
complex assembly tasks involving multiple hands and
users. Our system uses the CORIO...
The Two-User Responsive Workbench: Support for Collaboration Through Individual Views of a Shared Space
Virtual environments Responsive Workbench
font style='font-size:12px;'>
2016/5/24
We present the two-user Responsive Workbench: a projectionbased
virtual reality system that allows two people to simultaneously
view individual stereoscopic image pairs from their own
viewpoints. T...
Proton++: A Customizable Declarative Multitouch Framework
Proton++ custom attributes touch events symbols regular expressions gesture tablature
font style='font-size:12px;'>
2016/5/24
Proton++ is a declarative multitouch framework that allows
developers to describe multitouch gestures as regular expressions
of touch event symbols. It builds on the Proton framework
by allowing de...
A Development Environment for Horizontal Microcode
Index Terms{mi ro ode ompa tion Per olation S heduling environment
font style='font-size:12px;'>
2016/5/24
A Development Environment for Horizontal Microcode.
能耗是制约便携式智能设备发展的重要瓶颈.随着嵌入式操作系统的广泛应用,因不能合理使用操作系统的API而导致的能耗错误已经成为各种嵌入式应用开发过程中不容忽视的因素.为减少应用中的能耗错误,以符号执行技术为基础,根据禁止休眠类能耗错误的特点,设计了对应的能耗错误检测方法.该方法首先利用过程内分析,获得单个函数的符号执行信息.然后借助过程间分析对单个函数的符号执行信息进行全局综合,得到更为精确的执行开...
CMC:A Pragmatic Approach to Model Checking Real Code
CMC Pragmatic Approach Model Checking Real Code
font style='font-size:12px;'>
2015/8/7
Many system errors do not emerge unless some intricate sequence of events occurs. In practice, this means that most systems have errors that only trigger after days or weeks of execution. Model checki...
Using Model Checking to Find Serious File System Errors
Model Checking Serious File System Errors
font style='font-size:12px;'>
2015/8/7
This paper shows how to use model checking to find serious errors in file systems. Model checking is a formal verification technique tuned for finding corner-case errors by comprehensively exploring t...
Automatically Generating Malicious Disks using Symbolic Execution
Automatically Generating Malicious Disks Symbolic Execution
font style='font-size:12px;'>
2015/8/7
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant violations before usin...
Bugs as Deviant Behavior:A General Approach to Inferring Errors in Systems Code
Bugs as Deviant Behavior Inferring Errors Systems Code
font style='font-size:12px;'>
2015/8/7
A major obstacle to finding program errors in a real system is knowing what correctness rules the system must obey. These rules are often undocumented or specified in an ad hoc manner. This paper demo...
Building Intrusion Tolerant Applications
Intrusion Tolerant Applications system
font style='font-size:12px;'>
2015/8/5
The ITTC project provides tools and an infrastructure for building intrusion tolerant applications. Rather than prevent intrusions or detect them after the fact, the ITTC system ensures that the compr...
Oblivious Signature-Based Envelope
Signature-Based Envelope digitally signed certificates
font style='font-size:12px;'>
2015/8/5
Exchange of digitally signed certificates is often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated Trust Negotiation (ATN) ...
Identity based encryption from the Weil pairing
Weil pairing Identity based encryption
font style='font-size:12px;'>
2015/8/5
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffi...