Sciweavers

6348 search results - page 983 / 1270
» Extensible control architectures
Sort
View
KI
2001
Springer
15 years 9 months ago
Belief Update in the pGOLOG Framework
High-level controllers that operate robots in dynamic, uncertain domains are concerned with at least two reasoning tasks dealing with the effects of noisy sensors and effectors: T...
Henrik Grosskreutz, Gerhard Lakemeyer
POLICY
2001
Springer
15 years 9 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ACSAC
2000
IEEE
15 years 9 months ago
Secure Smart Homes using Jini and UIUC SESAME
In this paper, we discuss our approach to constructing a dynamic and secure “Smart Home” environment and tackling the challenges associated with it. We envision a Smart Home a...
Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas...
HICSS
2000
IEEE
101views Biometrics» more  HICSS 2000»
15 years 9 months ago
Strategic Management of IS/IT Functions: The Role of the CIO
Chief information officers (CIOs) have the difficult job of running a function that uses a lot of resources but offers little measurable evidence of its value. Line managers are i...
Petter Gottschalk, Nolan J. Taylor
ISCC
2000
IEEE
15 years 9 months ago
On Multiple Traffic Type Integration over Wireless TDMA Channels
A new medium access control (MAC) protocol for mobile wireless communications is presented and investigated. We explore, via an extensive simulation study, the performance of the ...
Polychronis Koutsakis, Michael Paterakis