Sciweavers

977 search results - page 142 / 196
» Integrated Environment Management for Information Operations...
Sort
View
CCS
2009
ACM
16 years 5 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
15 years 2 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
146
Voted
MICCAI
1999
Springer
15 years 8 months ago
A Steady-Hand Robotic System for Microsurgical Augmentation
This paper reports the development of a robotic system designed to extend a human’s ability to perform small-scale (sub-millimeter) manipulation tasks requiring human judgement, ...
Russell H. Taylor, Patrick S. Jensen, Louis L. Whi...
DIAGRAMS
2006
Springer
15 years 8 months ago
Canonical Correlation Analysis: Use of Composite Heliographs for Representing Multiple Patterns
In a study of crew interaction with the automatic flight control system of the Boeing 757/767 aircraft, we observed 60 flights and recorded every change in the aircraft control mo...
Asaf Degani, Michael G. Shafto, Leonard Olson
IVS
2008
124views more  IVS 2008»
15 years 4 months ago
Mobile analytics for emergency response and training
During emergency response events, situational awareness is critical in effectively managing and safe-guarding civilians and in-field personnel. To better support both command cent...
SungYe Kim, Ross Maciejewski, Karl Ostmo, Edward J...