Sciweavers

6137 search results - page 1127 / 1228
» Securing Collaborative Applications
Sort
View
ICRA
2006
IEEE
61views Robotics» more  ICRA 2006»
14 years 2 months ago
Simulated Odor Tracking in a Plane Normal to the Wind Direction
— A new strategy is developed for tracking an odor plume in an environment where wind is present. The strategy is inspired by the mechanisms that animals use to orient to stimuli...
Adam J. Rutkowski, Mark A. Willis, Roger D. Quinn
IROS
2006
IEEE
127views Robotics» more  IROS 2006»
14 years 2 months ago
A Pilot Study on Teleoperated Mobile Robots in Home Environments
– Mobile robots operating in home environments must deal with constrained space and a great variety of obstacles and situations to handle. This article presents a pilot study aim...
Daniel Labonte, François Michaud, Patrick B...
ISCC
2006
IEEE
14 years 2 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
ISSRE
2006
IEEE
14 years 2 months ago
Memoized Forward Computation of Dynamic Slices
Forward computation of dynamic slices is necessary to support interactive debugging and online analysis of long running programs. However, the overhead of existing forward computi...
Wes Masri, Nagi Nahas, Andy Podgurski
ITNG
2006
IEEE
14 years 2 months ago
Two-Party Private Vector Dominance: The All-Or-Nothing Deal
Alice holds a secret integer a while Bob holds a secret integer b, they want to decide on the predicate a > b with no information revealed other than the result. This is the we...
Maged Hamada Ibrahim
« Prev « First page 1127 / 1228 Last » Next »