Sciweavers

804 search results - page 37 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
TWC
2008
99views more  TWC 2008»
15 years 4 months ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan
IJON
2006
127views more  IJON 2006»
15 years 4 months ago
Evolved neural networks based on cellular automata for sensory-motor controller
Constructing the controller of a mobile robot has several issues to be addressed: how to automate behavior generation procedure, how to insert available domain knowledge effective...
Kyung-Joong Kim, Sung-Bae Cho
IROS
2009
IEEE
147views Robotics» more  IROS 2009»
15 years 11 months ago
Dynamics morphing from regulator to oscillator on bipedal control
— A stable non-linear oscillator for autonomous biped stepping control is designed in a top-down manner by morphing dynamics of standing regulator. It resolves three problems whi...
Tomomichi Sugihara
DBSEC
2004
83views Database» more  DBSEC 2004»
15 years 5 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...