Sciweavers

248 search results - page 15 / 50
» A non-holonomic systems approach to special function identit...
Sort
View
IEEEARES
2007
IEEE
14 years 1 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
IROS
2009
IEEE
159views Robotics» more  IROS 2009»
14 years 2 months ago
Hiding real-time: A new approach for the software development of industrial robots
—Software development for industrial robots is still strongly limited by the use of old-style robot programming languages. These languages are tailored to meet a special requirem...
Alwin Hoffmann, Andreas Angerer, Frank Ortmeier, M...
CCS
2010
ACM
13 years 5 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi
CORR
2006
Springer
80views Education» more  CORR 2006»
13 years 7 months ago
Exact Failure Frequency Calculations for Extended Systems
This paper shows how the steady-state availability and failure frequency can be calculated in a single pass for very large systems, when the availability is expressed as a product...
Annie Druault-Vicard, Christian Tanguy