Sciweavers

2517 search results - page 266 / 504
» Secure Deployment of Components
Sort
View
ICRA
2010
IEEE
140views Robotics» more  ICRA 2010»
13 years 8 months ago
Hierarchical planning architectures for mobile manipulation tasks in indoor environments
Abstract— This paper describes a hierarchical planner deployed on a mobile manipulation system. The main idea is a two-level hierarchy combining a global planner which provides r...
Ross A. Knepper, Siddhartha S. Srinivasa, Matthew ...
IJBIS
2010
94views more  IJBIS 2010»
13 years 7 months ago
A framework towards a multi-modal fingerprinting scheme for multimedia assets
Fingerprinting is a well known approach for identifying multimedia data without having the original data present but what amounts to its essence or "DNA". Current approa...
Atta Badii, Daniel Thiemert
CCS
2004
ACM
14 years 3 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
ICS
2003
Tsinghua U.
14 years 2 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CCS
2006
ACM
14 years 1 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...