Sciweavers

640 search results - page 31 / 128
» Access Control for Active Spaces
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 7 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
DAC
2007
ACM
14 years 9 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
SG
2010
Springer
14 years 1 months ago
ColourVision - Controlling Light Patterns through Postures
ColourVision is an interactive installation that empowers people to step into an intensive dialogue with colors. Physical seating postures such as active, relaxed or reflective pos...
Alexander Wiethoff, Andreas Butz
NIPS
2004
13 years 10 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
IROS
2008
IEEE
125views Robotics» more  IROS 2008»
14 years 3 months ago
Neighborhood denoising for learning high-dimensional grasping manifolds
— Human control of high degree-of-freedom robotic systems, e.g. anthropomorphic robot hands, is often difficult due to the overwhelming number of variables that need to be speci...
Aggeliki Tsoli, Odest Chadwicke Jenkins