Sciweavers

640 search results - page 67 / 128
» Access Control for Active Spaces
Sort
View
TROB
2010
103views more  TROB 2010»
13 years 3 months ago
A Geometrically Exact Model for Externally Loaded Concentric-Tube Continuum Robots
Continuum robots, which are composed of multiple concentric, precurved elastic tubes, can provide dexterity at diameters equivalent to standard surgical needles. Recent mechanicsba...
D. Caleb Rucker, Bryan A. Jones, Robert J. Webster...
PET
2004
Springer
14 years 2 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
BROADNETS
2007
IEEE
14 years 3 months ago
TCP dynamics over IEEE 802.11E WLANs: Modeling and throughput enhancement
— Today, IEEE 802.11 Wireless LAN (WLAN) has become a prevailing solution for broadband wireless Internet access while Transport Control Protocol (TCP) is the dominant transport ...
Jeonggyun Yu, Sunghyun Choi, Daji Qiao
ISCA
2010
IEEE
305views Hardware» more  ISCA 2010»
14 years 1 months ago
Rethinking DRAM design and organization for energy-constrained multi-cores
DRAM vendors have traditionally optimized the cost-perbit metric, often making design decisions that incur energy penalties. A prime example is the overfetch feature in DRAM, wher...
Aniruddha N. Udipi, Naveen Muralimanohar, Niladris...
GLOBECOM
2009
IEEE
14 years 3 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...