Sciweavers

307 search results - page 29 / 62
» A Network Access Control Mechanism Based on Behavior Profile...
Sort
View
MVA
1998
118views Computer Vision» more  MVA 1998»
13 years 9 months ago
Integrated Vision/Control System for Autonomous Planetary Rovers
Current NASA plans call for extended year-long, multikilometer treks for the 2003 and 2005 Mars missions. A much greater amount of rover autonomy is required compared to the recen...
Terry Huntsberger, Toshiro Kubota, John Rose
IMC
2004
ACM
14 years 1 months ago
On the responsiveness of DNS-based network control
For the last few years, large Web content providers interested in improving their scalability and availability have increasingly turned to three techniques: mirroring, content dis...
Jeffrey Pang, Aditya Akella, Anees Shaikh, Balacha...
WINET
2010
105views more  WINET 2010»
13 years 6 months ago
Flow rank based probabilistic fair scheduling for wireless ad hoc networks
Fair scheduling is an ideal candidate for fair bandwidth sharing and thereby achieving fairness among the contending flows in a network. It is particularly challenging for ad hoc ...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...
SCAI
2008
13 years 9 months ago
Modeling Habituation in the Cnidarian Hydra
Abstract. In the design of behavior-based control architectures for robots it is common to use biology as inspiration, and often the observed functionalities of insect behaviors ar...
Malin Aktius, Mats Nordahl, Tom Ziemke
SIGOPSE
2004
ACM
14 years 1 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn