Sciweavers

1317 search results - page 103 / 264
» A new delay system approach to network-based control
Sort
View
SECURWARE
2008
IEEE
14 years 3 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
PODC
1995
ACM
14 years 25 days ago
Issues in Distributed Control for ATM Networks
Asynchronous Transfer Mode (ATM) network technology is expected to become a central part of the emerging global information infrastructure. ATM networks introduce a number of feat...
Jonathan S. Turner
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 6 months ago
Soft Control on Collective Behavior of a Group of Autonomous Agents by a Shill Agent
This paper asks a new question: how can we control the collective behavior of self-organized multi-agent systems? We try to answer the question by proposing a new notion called `So...
Jing Han, Ming Li, Lei Guo
SNPD
2008
13 years 10 months ago
An Approach to Modeling Software Safety
: Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. Software safety is a co...
M. Ben Swarup, P. Seetha Ramaiah
CHI
2007
ACM
14 years 9 months ago
BodySpace: inferring body pose for natural control of a music player
We describe the BodySpace system, which uses inertial sensing and pattern recognition to allow the gestural control of a music player by placing the device at different parts of t...
Steven Strachan, Roderick Murray-Smith, M. Sile O'...