Sciweavers

807 search results - page 62 / 162
» Term Rewriting for Access Control
Sort
View
128
Voted
EMSOFT
2007
Springer
15 years 7 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
128
Voted
DAIS
2010
15 years 5 months ago
Service Discovery in Ubiquitous Feedback Control Loops
Abstract. Nowadays, context-aware applications can discovery and interact with services in ubiquitous environments in order to customize their behavior. In general, these providers...
Daniel Romero 0002, Romain Rouvoy, Lionel Seinturi...
136
Voted
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
120
Voted
CHI
2009
ACM
16 years 4 months ago
An fNIR based BMI for letter construction using continuous control
A long term goal of assistive technology research is to build creative expression applications where subjects can extemporaneously express themselves. Sketch drawing is one form o...
Rudolph L. Mappus IV, Girish R. Venkatesh, Chetna ...
120
Voted
ICC
2007
IEEE
15 years 10 months ago
Design and Evaluation of IP Header Compression for Cellular-Controlled P2P Networks
Abstract— In this paper we advocate to exploit terminal cooperation to stabilize IP communication using header compression. The terminal cooperation is based on direct communicat...
Tatiana K. Madsen, Qi Zhang, Frank H. P. Fitzek, M...