Sciweavers

138 search results - page 7 / 28
» Damage control
Sort
View
CHI
2010
ACM
14 years 2 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
CNIS
2006
13 years 8 months ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman
CCS
2010
ACM
13 years 7 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
ENGL
2008
110views more  ENGL 2008»
13 years 7 months ago
Tactile Sensing-Based Control Architecture in Multi-Fingered Arm for Object Manipulation
This report presents the development of tactile sensing-based control architecture in a multi-fingered humanoid robot arm for object manipulation tasks. With the aim to enhance the...
Hanafiah B. Yussof, Masahiro Ohka, Hirofumi Suzuki...
ICRA
2006
IEEE
112views Robotics» more  ICRA 2006»
14 years 1 months ago
Robot-assisted Catheter Insertion using Hybrid Impedance Control
— Angioplasty is a minimally invasive procedure wherein a catheter (a thermoplastic hollow wire) is inserted into the femoral artery and guided till it reaches a blockage in the ...
Jagadeesan Jayender, Rajnikant V. Patel, S. Nikumb