Sciweavers

209 search results - page 4 / 42
» Establishing Persistent Identity using the Handle System
Sort
View
ICRA
2008
IEEE
118views Robotics» more  ICRA 2008»
14 years 3 months ago
HLS parameter estimation for multi-input multi-output systems
Abstract— In order to reduce computational burden of identification methods for multivariable systems, a hierarchical least squares (HLS) algorithm is developed. The basic idea ...
Ping Yuan, Feng Ding, Peter X. Liu
TGC
2007
Springer
14 years 2 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
FC
2009
Springer
121views Cryptology» more  FC 2009»
14 years 3 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
ADAEUROPE
2001
Springer
14 years 1 months ago
Building Modern Distributed Systems
Abstract. Ada 95 has been the first standardized language to include distribution in the core language itself. However, the set of features required by the Distributed Systems Ann...
Laurent Pautet, Thomas Quinot, Samuel Tardieu
CN
2004
108views more  CN 2004»
13 years 8 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark