Sciweavers

434 search results - page 68 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
14 years 27 days ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
SECON
2007
IEEE
14 years 1 months ago
An Externality-based Decentralized Optimal Power Allocation Scheme for Wireless Mesh Networks
— The rapidly growing demand for wireless communication makes efficient power allocation a critical factor in the network’s efficient operation. Recently power allocation in ...
Shrutivandana Sharma, Demosthenis Teneketzis
ATAL
2009
Springer
14 years 2 months ago
Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties
How do we build multiagent algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human intera...
James Pita, Manish Jain, Fernando Ordó&ntil...
IROS
2009
IEEE
304views Robotics» more  IROS 2009»
14 years 2 months ago
Real time tracking using an active pan-tilt-zoom network camera
— We present here a real time active vision system on a PTZ network camera to track an object of interest. We address two critical issues in this paper. One is the control of the...
Thang Ba Dinh, Qian Yu, Gérard G. Medioni
COORDINATION
2004
Springer
14 years 1 months ago
Enforcement of Communal Policies for P2P Systems
Abstract. We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an...
Mihail F. Ionescu, Naftaly H. Minsky, Thu D. Nguye...