Sciweavers

362 search results - page 53 / 73
» An access control model for simplifying constraint expressio...
Sort
View
MSWIM
2005
ACM
14 years 1 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
13 years 11 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ICRA
2007
IEEE
119views Robotics» more  ICRA 2007»
14 years 1 months ago
Progressive Clamping
—In this paper we propose the progressive clamping method to better model the kinematic anisotropy of joint limits for virtual mannequins or robots. Like recent approaches our me...
Daniel Raunhardt, Ronan Boulic
VRST
2000
ACM
13 years 12 months ago
Animated deformations with radial basis functions
We present a novel approach to creating deformations of polygonal models using Radial Basis Functions (RBFs) to produce localized real-time deformations. Radial Basis Functions as...
Jun-yong Noh, Douglas Fidaleo, Ulrich Neumann
AROBOTS
1998
130views more  AROBOTS 1998»
13 years 7 months ago
Rough Terrain Autonomous Mobility-Part 2: An Active Vision, Predictive Control Approach
Off-road autonomous navigation is one of the most difficult automation challenges from the point of view of constraints on mobility, speed of motion, lack of environmental structur...
Alonzo Kelly, Anthony Stentz