Sciweavers

796 search results - page 70 / 160
» Spoofing prevention method
Sort
View
NJC
2006
57views more  NJC 2006»
13 years 10 months ago
Towards Unambiguous Model Fragments
In model based design model fragments are used in everyday work. Concurrent operations on separate parts of a model and communication between stakeholders are some examples. Howeve...
Mika Siikarla, Jari Peltonen, Johannes Koskinen
TIFS
2008
123views more  TIFS 2008»
13 years 10 months ago
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
Abstract--Digital single lens reflex cameras suffer from a wellknown sensor dust problem due to interchangeable lenses that they deploy. The dust particles that settle in front of ...
Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon
JOT
2002
52views more  JOT 2002»
13 years 9 months ago
Negotiable Interfaces for Components
es are extended with a factorable, abstract state, and methods of interfaces are extended with state transformation behaviours. A new programming language command, the USE statemen...
Simon D. Kent, Chris Ho-Stuart, Paul Roe
RAS
2010
117views more  RAS 2010»
13 years 8 months ago
Direct programming of a central pattern generator for periodic motions by touching
Much of the literature shows that Central Pattern Generators (CPGs) are a good approach for generating periodic motions for legged robots. In most of the presented works the numer...
Fabio Dalla Libera, Takashi Minato, Hiroshi Ishigu...
SMC
2010
IEEE
157views Control Systems» more  SMC 2010»
13 years 8 months ago
Business Continuity management system that supports progress management and operational planning
— Japan is known as an “earthquake country” and hence both companies and governments require an operation management method called BCM to ensure that operations and services ...
Seigo Kawamura, Yoshio Nakatani