Sciweavers

798 search results - page 90 / 160
» Comparing the expressive power of access control models
Sort
View
ICRA
2008
IEEE
129views Robotics» more  ICRA 2008»
14 years 3 months ago
Modeling of a closed loop cable-conduit transmission system
— Many surgical robots use cable-conduit pairs in a pull-pull configuration to actuate the instruments and transmit power into the patient’s body. Friction between the cable an...
Varun Agrawal, William J. Peine, Bin Yao
CSB
2004
IEEE
115views Bioinformatics» more  CSB 2004»
14 years 23 days ago
PoPS: A Computational Tool for Modeling and Predicting Protease Specificity
Proteases play a fundamental role in the control of intra- and extracellular processes by binding and cleaving specific amino acid sequences. Identifying these targets is extremel...
Sarah E. Boyd, Maria J. García de la Banda,...
ESSMAC
2003
Springer
14 years 2 months ago
Joint Optimization of Wireless Communication and Networked Control Systems
Abstract. We consider a linear system, such as an estimator or a controller, in which several signals are transmitted over wireless communication channels. With the coding and medi...
Lin Xiao, Mikael Johansson, Haitham A. Hindi, Step...
MSWIM
2005
ACM
14 years 2 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
MODELLIERUNG
2008
13 years 10 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel