Sciweavers

196 search results - page 23 / 40
» Extension of SMIL with QoS Control and its Implementation
Sort
View
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 7 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
TFS
2008
96views more  TFS 2008»
13 years 7 months ago
Fuzzy Qualitative Robot Kinematics
We propose a fuzzy qualitative (FQ) version of robot kinematics with the goal of bridging the gap between symbolic or qualitative functions and numerical sensing and control tasks...
Honghai Liu, David J. Brown, George Macleod Coghil...
LCTRTS
2010
Springer
14 years 2 months ago
Contracts for modular discrete controller synthesis
We describe the extension of a reactive programming language with a behavioral contract construct. It is dedicated to the programming of reactive control of applications in embedd...
Gwenaël Delaval, Hervé Marchand, &Eacu...
INFOCOM
1999
IEEE
13 years 11 months ago
MTCP: Scalable TCP-like Congestion Control for Reliable Multicast
We present MTCP, a congestion control scheme for large-scale reliable multicast. Congestion control for reliable multicast is important, because of its wide applications in multim...
Injong Rhee, Nallathambi Balaguru, George N. Rousk...
CCS
2009
ACM
14 years 2 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...