Sciweavers

617 search results - page 95 / 124
» Research Challenges for the Security of Control Systems
Sort
View
ICRA
2010
IEEE
154views Robotics» more  ICRA 2010»
13 years 7 months ago
Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator
— Soft robotic systems have applications in industrial, medical, and security applications. Many applications require these robots to be small and lightweight. One challenge in d...
Nadia Cheng, Genya Ishigami, Stephan Hawthorne, Ha...
ICSE
2005
IEEE-ACM
14 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
LCN
2008
IEEE
14 years 3 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
DEXAW
2008
IEEE
98views Database» more  DEXAW 2008»
14 years 3 months ago
Interface for Multidisciplinary Virtual Prototype Components
Computer-based concurrent engineering of products, denoted as Virtual Engineering (VE), is used extensively to meet the requirements of product development. Current research deals...
Stephan Vornholt, Ingolf Geist
MSR
2006
ACM
14 years 3 months ago
TA-RE: an exchange language for mining software repositories
Software repositories have been getting a lot of attention from researchers in recent years. In order to analyze software repositories, it is necessary to first extract raw data f...
Sunghun Kim, Thomas Zimmermann, Miryung Kim, Ahmed...