Sciweavers

1683 search results - page 297 / 337
» A Needed Narrowing Strategy
Sort
View
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
14 years 4 months ago
Reaction Mass Pendulum (RMP): An explicit model for centroidal angular momentum of humanoid robots
Abstract— A number of conceptually simple but behaviorrich “inverted pendulum” humanoid models have greatly enhanced the understanding and analytical insight of humanoid dyna...
Sung-Hee Lee, Ambarish Goswami
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 4 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
CAISE
2007
Springer
14 years 4 months ago
Analyzing the Business of Software: A Modelling Technique for Software Supply Networks
Abstract. One of the most significant paradigm shifts of software business management is that individual organizations no longer compete as single entities but as complex dynamic ...
Slinger Jansen, Anthony Finkelstein, Sjaak Brinkke...
CPAIOR
2007
Springer
14 years 4 months ago
Cost-Bounded Binary Decision Diagrams for 0-1 Programming
Abstract. In recent work binary decision diagrams (BDDs) were introduced as a technique for postoptimality analysis for integer programming. In this paper we show that much smaller...
Tarik Hadzic, John N. Hooker
EUC
2007
Springer
14 years 4 months ago
A Selective Push Algorithm for Cooperative Cache Consistency Maintenance over MANETs
Cooperative caching is an important technique to support efficient data dissemination and sharing in Mobile Ad hoc Networks (MANETs). In order to ensure valid data access, the cach...
Yu Huang 0002, Beihong Jin, Jiannong Cao, Guangzho...