Sciweavers

640 search results - page 45 / 128
» Access Control for Active Spaces
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
IROS
2008
IEEE
171views Robotics» more  IROS 2008»
14 years 3 months ago
Biomimetic grasp planning for cortical control of a robotic hand
— In this paper we outline a grasp planning system designed to augment the cortical control of a prosthetic arm and hand. A key aspect of this task is the presence of on-line use...
Matei T. Ciocarlie, Samuel T. Clanton, M. Chance S...
WEBNET
2001
13 years 10 months ago
Personal Information Organization using Web Annotations
: As more information is made available online, users collect information in personal information spaces like bookmarks and emails. While most users feel that organizing these coll...
Laurent Denoue, Laurence Vignollet
HICSS
1995
IEEE
109views Biometrics» more  HICSS 1995»
14 years 11 days ago
The architecture of an optimistic CPU: the WarpEngine
The architecture for a shared memory CPU is described. The CPU allows for parallelism down to the level of single instructions and is tolerant of memory latency. All executable in...
John G. Cleary, Murray Pearson, Husam Kinawi
EUROSYS
2008
ACM
14 years 5 months ago
DepSpace: a byzantine fault-tolerant coordination service
The tuple space coordination model is one of the most interesting coordination models for open distributed systems due to its space and time decoupling and its synchronization pow...
Alysson Neves Bessani, Eduardo Adílio Pelin...