Sciweavers

1352 search results - page 254 / 271
» Designing Security Requirements Models Through Planning
Sort
View
INFOCOM
2002
IEEE
14 years 14 days ago
Equation-Based Packet Marking for Assured Forwarding Services
Abstract— This paper introduces a new packet marking algorithm that can be used in the context of Assured Forwarding (AF) in the Differentiated Services (DiffServ) framework [1],...
Mohamed A. El-Gendy, Kang G. Shin
ICRA
2000
IEEE
100views Robotics» more  ICRA 2000»
13 years 12 months ago
Robots Can Teach People How to Move Their Arm
We describe a new theoretical framework for robot-aided training of arm movements. This framework is based on recent studies of motor adaptation in human subjects and on general c...
Ferdinando A. Mussa-Ivaldi, James L. Patton
WETICE
1998
IEEE
13 years 11 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
CIDR
2007
144views Algorithms» more  CIDR 2007»
13 years 9 months ago
Cache-Oblivious Query Processing
We propose a radical approach to relational query processing that aims at automatically and consistently achieving a good performance on any memory hierarchy. We believe this auto...
Bingsheng He, Qiong Luo
AAAI
2004
13 years 9 months ago
Branching Storylines in Virtual Reality Environments for Leadership Development
Simulation-based training is increasingly being used within the military to practice and develop the skills of successful soldiers. For the skills associated with successful milit...
Andrew Gordon, Michael van Lent, Martin Van Velsen...