Sciweavers

3458 search results - page 147 / 692
» Abstracting Control
Sort
View
114
Voted
HYBRID
1999
Springer
15 years 6 months ago
Path Planning and Flight Controller Scheduling for an Autonomous Helicopter
Abstract. In this article we investigate how to generate flight trajectories for an autonomous helicopter. The planning strategy that we propose reflects the controller architect...
Magnus Egerstedt, Tak-John Koo, Frank Hoffmann, Sh...
126
Voted
ECIR
2004
Springer
15 years 4 months ago
Improving Retrieval Effectiveness by Reranking Documents Based on Controlled Vocabulary
Abstract. There is a common availability of classification terms in online text collections and digital libraries, such as manually assigned keywords or key-phrases from a controll...
Jaap Kamps
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 4 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
NETWORKING
2004
15 years 4 months ago
Self-Admission Control for IP Telephony Using Early Quality Estimation
Abstract. If quality of service could be provided at the transport or the application layer, then it might be deployed simply by software upgrades, instead of requiring a complete ...
Olof Hagsand, Ignacio Más Ivars, Ian Marsh,...
JHSN
2006
267views more  JHSN 2006»
15 years 2 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...