Sciweavers

118 search results - page 16 / 24
» Meca: A Tool for Access Control Models
Sort
View
AR
2010
149views more  AR 2010»
13 years 7 months ago
Laparoscopic Surgical Robot for Remote In Vivo Training
This paper introduces the Laparobot, a tele-operated surgical robot designed specifically for training surgeons in advanced laparoscopic techniques. The Laparobot allows a student...
Brian F. Allen, Brett Jordan, William Pannell, Cat...
HICSS
2012
IEEE
324views Biometrics» more  HICSS 2012»
12 years 3 months ago
Extending BPMN for Business Activity Monitoring
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...
AI
2009
Springer
14 years 2 months ago
Grid-Enabled Adaptive Metamodeling and Active Learning for Computer Based Design
Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a feasible alte...
Dirk Gorissen
USS
2008
13 years 9 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
SIMUTOOLS
2008
13 years 8 months ago
Simulating wireless and mobile networks in OMNeT++ the MiXiM vision
Wireless communication has attracted considerable interest in the research community, and many wireless networks are evaluated using discrete event simulators like OMNeT++. Althou...
A. Köpke, M. Swigulski, K. Wessel, D. Willkom...