Sciweavers

469 search results - page 47 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
ICRA
2007
IEEE
148views Robotics» more  ICRA 2007»
14 years 2 months ago
Remote Low Frequency State Feedback Kinematic Motion Control for Mobile Robot Trajectory Tracking
— Teleoperated robots generally receive high level commands from a remote system, while accomplishing motion control through conventional means. We present a teleoperated system ...
Daniel Montrallo Flickinger, Mark A. Minor
ADT
2008
13 years 8 months ago
A service-oriented admission control strategy for class-based IP networks
The clear trend toward the integration of current and emerging applications and services in the Internet launches new demands on service deployment and management. Distributed serv...
Solange Rito Lima, Paulo Carvalho, Vasco Freitas
CCS
2009
ACM
14 years 9 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
ICRA
2007
IEEE
165views Robotics» more  ICRA 2007»
14 years 2 months ago
Emotional Architecture for the Humanoid Robot Head ROMAN
— Humanoid robots as assistance or educational robots is an important research topic in the field of robotics. Especially the communication of those robots with a human operator...
Jochen Hirth, Norbert Schmitz, Karsten Berns