Sciweavers

408 search results - page 10 / 82
» Network laws
Sort
View
CCS
2009
ACM
14 years 4 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
CONSTRAINTS
2010
75views more  CONSTRAINTS 2010»
13 years 7 months ago
Redundant modeling in permutation weighted constraint satisfaction problems
Yat Chiu Law, Jimmy Ho-Man Lee, May H. C. Woo
PR
2007
101views more  PR 2007»
13 years 9 months ago
Use of power law models in detecting region of interest
In this paper, we shall address the issue of semantic extraction of different regions of interest. The proposed approach is based on statistical methods and models inspired from l...
Yves Caron, Pascal Makris, Nicole Vincent
ICRA
2007
IEEE
122views Robotics» more  ICRA 2007»
14 years 4 months ago
Decentralized, Adaptive Control for Coverage with Networked Robots
— A decentralized, adaptive control law is presented to drive a network of mobile robots to a near-optimal sensing configuration. The control law is adaptive in that it integrat...
Mac Schwager, Jean-Jacques E. Slotine, Daniela Rus
EGOV
2004
Springer
14 years 3 months ago
e-Government and Information Society: The First Regional Law in Italy
The law recently approved by the the Regional Administration of Tuscany (January 2004) regulates the promotion of electronic administration and the development of the Information ...
Isabella D'Elia